Parent directory/ | - | - |
A Device Fingerprint as a Cure for Fraud. It All Depends on Dosage.mp4 | 2.2 MiB | 2021 Apr 29 08:34 |
Andy, the Polluters, Rick Deckard, and Other Bounty Hunters.mp4 | 99.1 MiB | 2021 Apr 29 08:34 |
Another Round of the Standoff IS Services as a Response to New Threats and Challenges.mp4 | 320.0 MiB | 2021 Apr 29 08:34 |
Brute-Forced in Sixty Seconds.mp4 | 23.0 MiB | 2021 Apr 29 08:34 |
Building Honeypots to Monitor DDoS.mp4 | 104.0 MiB | 2021 Apr 29 08:34 |
Catch Me If You Can.mp4 | 32.6 MiB | 2021 Apr 29 08:34 |
Crowdsourced Malware Triage.mp4 | 225.5 MiB | 2021 Apr 29 08:34 |
Defense and Offense Technologies in 2016 Which Side will Make a Breakthrough.mp4 | 191.6 MiB | 2021 Apr 29 08:34 |
Defense and Offense Technologies in 2016 Which Side will Make a Breakthrough.srt | 81.7 KiB | 2019 Sep 30 21:29 |
Development and Implementation of HMAC in the Frame of the White-Box Cryptography Model.mp4 | 41.8 MiB | 2021 Apr 29 08:34 |
Development of New Graphic Models for Computer Network Visualization.mp4 | 32.5 MiB | 2021 Apr 29 08:34 |
Development of New Graphic Models for Computer Network Visualization.srt | 10.2 KiB | 2019 Sep 30 21:28 |
Development of Public Key Cryptosystems Based on a Generalized Knapsack Problem.mp4 | 24.6 MiB | 2021 Apr 29 08:34 |
Development of Public Key Cryptosystems Based on a Generalized Knapsack Problem.srt | 7.8 KiB | 2019 Sep 30 21:29 |
Electronic Access Control Security.mp4 | 347.1 MiB | 2021 Apr 29 08:34 |
Experts Don’t Need No Education. Information Security and Other Pseudosciences.mp4 | 150.6 MiB | 2021 Apr 29 08:34 |
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Detection.mp4 | 141.7 MiB | 2021 Apr 29 08:34 |
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Detection.srt | 76.0 KiB | 2019 Sep 30 21:29 |
Face to Face the Arbiters of Security.mp4 | 337.2 MiB | 2021 Apr 29 08:34 |
Fear and Loathing in Telecoms.mp4 | 83.0 MiB | 2021 Apr 29 08:34 |
Fear and Loathing in Telecoms.srt | 34.5 KiB | 2019 Sep 30 21:29 |
Fingerprinting and Attacking a Healthcare Infrastructure.mp4 | 126.1 MiB | 2021 Apr 29 08:34 |
Flash is Dead. Flash Forever.mp4 | 35.1 MiB | 2021 Apr 29 08:34 |
How I Became Paranoid in the World of Mobile Devices.mp4 | 53.5 MiB | 2021 Apr 29 08:34 |
How We Developed the Federal Standard of SSDL.mp4 | 44.3 MiB | 2021 Apr 29 08:34 |
How We Developed the Federal Standard of SSDL.srt | 15.9 KiB | 2019 Sep 30 21:28 |
How to Become the Sole Owner of Your PC.mp4 | 196.4 MiB | 2021 Apr 29 08:34 |
How to Start an Information Security Business.mp4 | 63.8 MiB | 2021 Apr 29 08:34 |
IT Round.mp4 | 326.0 MiB | 2021 Apr 29 08:34 |
If You Find One, There are Probably More A Detection Method of Reproduced Vulnerability.mp4 | 86.5 MiB | 2021 Apr 29 08:34 |
If You Find One, There are Probably More A Detection Method of Reproduced Vulnerability.srt | 24.8 KiB | 2019 Sep 30 21:29 |
Industrial System Security Its Time to Take Action.mp4 | 341.2 MiB | 2021 Apr 29 08:34 |
Integration of Quantum Keys into Data Encryption Algorithms in a Russian Telecom Network.mp4 | 12.4 MiB | 2021 Apr 29 08:34 |
Janitor to CISO in 360 Seconds Exploiting Mechanical Privilege Escalation.mp4 | 170.6 MiB | 2021 Apr 29 08:34 |
Janitor to CISO in 360 Seconds Exploiting Mechanical Privilege Escalation.srt | 58.6 KiB | 2019 Sep 30 21:28 |
KASan in a Bare-Metal Hypervisor.mp4 | 35.5 MiB | 2021 Apr 29 08:34 |
Machine Learning Technique to Detect Generated Domain Names.mp4 | 40.5 MiB | 2021 Apr 29 08:34 |
Magic box or A Story about White Hat ATM Hackers.mp4 | 20.9 MiB | 2021 Apr 29 08:34 |
Magic box or A Story about White Hat ATM Hackers.srt | 52.2 KiB | 2019 Sep 30 21:29 |
Memory Protection Based Anti-Cheat for Computer Games.mp4 | 148.2 MiB | 2021 Apr 29 08:34 |
Memory Protection Based Anti-Cheat for Computer Games.srt | 44.7 KiB | 2019 Sep 30 21:29 |
Methods and Software for Risk Evaluation and Countermeasure Selection.mp4 | 2.8 MiB | 2021 Apr 29 08:34 |
Methods and Software for Risk Evaluation and Countermeasure Selection.srt | 15.8 KiB | 2019 Sep 30 21:29 |
NFC Naked Fried Chicken.mp4 | 85.3 MiB | 2021 Apr 29 08:34 |
No viruses I wouldnt be so sure.mp4 | 58.4 MiB | 2021 Apr 29 08:34 |
No viruses I wouldnt be so sure.srt | 14.5 KiB | 2019 Sep 30 21:29 |
Privacy and Security in the Internet of Things.mp4 | 171.5 MiB | 2021 Apr 29 08:34 |
Pseudo-Security of NFC Services.mp4 | 50.0 MiB | 2021 Apr 29 08:34 |
Pseudo-Security of NFC Services.srt | 15.6 KiB | 2019 Sep 30 21:29 |
Real and Formal Security Born to Be Together - YouTube.mp4 | 199.1 MiB | 2021 Apr 29 08:34 |
Realization of Self-Learning Techniques in WAF.mp4 | 75.0 MiB | 2021 Apr 29 08:34 |
Reverse Engineering of Binary Structures Using Kaitai Struct.mp4 | 142.2 MiB | 2021 Apr 29 08:34 |
Reverse Engineering of Binary Structures Using Kaitai Struct.srt | 44.6 KiB | 2019 Sep 30 21:28 |
SIEM, or not SIEM, That is the Question.mp4 | 341.9 MiB | 2021 Apr 29 08:34 |
Scalable and Effective Fuzzing of Google Chrome.mp4 | 182.0 MiB | 2021 Apr 29 08:34 |
Security Automation Based on Artificial Intelligence.mp4 | 133.3 MiB | 2021 Apr 29 08:34 |
Static Code Analysis in the SSDL Context.mp4 | 28.9 MiB | 2021 Apr 29 08:34 |
Static Code Analysis in the SSDL Context.srt | 13.7 KiB | 2019 Sep 30 21:28 |
Targeted Attacks Be the First to Aim.mp4 | 153.5 MiB | 2021 Apr 29 08:34 |
The City Never Sleeps.mp4 | 48.5 MiB | 2021 Apr 29 08:34 |
The City Never Sleeps.srt | 13.5 KiB | 2019 Sep 30 21:29 |
Time is Not on Your Side Exploiting Browser-Based Timing Attacks.mp4 | 148.5 MiB | 2021 Apr 29 08:34 |
Waf.js How to Protect Web Applications Using JavaScript.mp4 | 192.9 MiB | 2021 Apr 29 08:34 |
Web Application Firewall Bypassing.mp4 | 150.9 MiB | 2021 Apr 29 08:34 |
Web Application Firewall Bypassing.srt | 48.1 KiB | 2019 Sep 30 21:29 |
Why We Hack The Truth.mp4 | 288.6 MiB | 2021 Apr 29 08:34 |
john-devkit 100 Hash Types Later.mp4 | 35.4 MiB | 2021 Apr 29 08:34 |
john-devkit 100 Hash Types Later.srt | 15.0 KiB | 2019 Sep 30 21:29 |