24 Techniques to Gather Threat Intel and Track Actors |
Black Hat Asia 2017
|
Malware Command and Control Channels: A journey into darkness |
DEF CON 24
|
Samsung Pay: Tokenized Numbers, Flaws and Issues |
DEF CON 24
|
Non-English spam: a case study |
VB2008 Ottawa
|
Continual feature selection: a cost effective method for enhancing the capabilities of enterprise spam solutions |
VB2007 Vienna
|