- Presentations
- Documents
- Infographics
Voice securityprotocol review
Fabio Pietrosanti
•
13 years ago
Stealthy, Hypervisor-based Malware Analysis
Tamas K Lengyel
•
8 years ago
Voice communication security
Fabio Pietrosanti
•
13 years ago
EBPF and Linux Networking
PLUMgrid
•
8 years ago
Android Radio Layer Interface
Chun-Yu Wang
•
13 years ago
HitCon'14: On the Feasibility of Automatically Generating Android Component Hijacking Exploits
daoyuan0x
•
9 years ago
Malware's Most Wanted: CryptoLocker—The Ransomware Trojan
Cyphort
•
9 years ago