-
Be the first to like this
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Published on
Presentation at 5th Annual QED Conference on Cybersecurity on 22 June 2017: https://qed.eu/Events/5th%20Annual%20QED%20Conference%20on%20Cybersecurity%20/Bio/
Video available at: https://www.youtube.com/watch?v=y0vg231Bl6o&t=778s
Be the first to like this
Login to see the comments