Using Machine-Learning to Investigate Web Campaigns at Large |
HITBSecConf2018 – Beijing
|
Social Media Mining for Threat Intelligence |
HITBSecConf2018 – Beijing
|
Security issues of IoV devices |
VB2018 Montreal
|
Modern Day Entomology - Examining the Inner Workings of the Bug Bazaar |
BlueHat v18
|
Who Controls the Controllers—Hacking Crestron IoT Automation Systems |
DEF CON 26
|
Mining Botnets Reemerge, Bringing Shifts into the Threat Landscape |
RSAC Asia Pacific & Japan 2018
|
Truth or Snare? Understand and Combat Cyber-Propaganda and Fake News |
RSAC Asia Pacific & Japan 2018
|
Industrial IoT Exploits behind Insecure Cities and Rogue Robots |
RSAC USA 2018
|
COMMSEC: The Sound of a Targeted Attack: Attacking IoT Speakers |
HITBSecConf2018 – Amsterdam
|
Ticket to Ride: Abusing The Travel and Hospitality Industry for Profit |
HITBSecConf2018 – Amsterdam
|