×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
D1 COMMSEC - Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding - Vikash Yadav.pdf
Home
/
Discover
/
conference.hitb.org
/
hitbsecconf2018dxb
/
materials
/
Parent Folder
D1 COMMSEC - Enhancing Deep Learning DGA Detection Models Using Separate Character Embedding - Vikash Yadav.pdf
PDF
6 years ago
5.37 MB
Copy Link
D1 COMMSEC - Building Your Own Self Driving, Self Racing Car - Dhillon Kannabhiran.pdf
PDF
6 years ago
3.10 MB
Copy Link
D1 COMMSEC - Hacking Yachts Remotely - IoT Hacking at Sea - Stephan Gerling.pdf
PDF
6 years ago
2.95 MB
Copy Link
D1 COMMSEC - Building Security Beyond The Genesis Block - Ryan Shepherd.pdf
PDF
6 years ago
5.37 MB
Copy Link
D1 COMMSEC - Hacking into Broadband and Broadcast TV Systems - Chaouki Kasmi, Thomas Sabono and Pierre Barre.pdf
PDF
6 years ago
1.56 MB
Copy Link
D1 BSIDES - Cyber Security of the Future - Dr Bushra AlBelooshi.pdf
PDF
6 years ago
5.48 MB
Copy Link
D1 COMMSEC - Hacking the 0day Market - Andrea Zapparoli Manzoni.pdf
PDF
6 years ago
4.26 MB
Copy Link
D1 COMMSEC - System-level Threats - Dangerous Assumptions in Modern Product Security - Cristofaro Mune.pdf
PDF
6 years ago
1.82 MB
Copy Link
D1 BSIDES - Creating Custom Browser Extensions to Hunt Low Hanging Fruits - Rewanth Cool.pdf
PDF
6 years ago
927.99 kB
Copy Link
D1 BSIDES - Blockchain - The New Line of Defense - Ramy AlDamati.pdf
PDF
6 years ago
5.81 MB
Copy Link
D1 COMMSEC - Taking Over Telecom Networks - Loay Hassan Abdelrazak and Hardik Mehta.pdf
PDF
6 years ago
4.44 MB
Copy Link
CLOSING KEYNOTE - Blind Digital Signatures - Dr Manar Abu Talib and Dr Qassim Nasir.pdf
PDF
6 years ago
5.84 MB
Copy Link
D1 KEYNOTE - Crouching Tiger Sudden Keynote - Katie Moussouris.pdf
PDF
6 years ago
4.05 MB
Copy Link
D1T1 - AI Model Security - Reverse Engineering Machine Learning Models - Kang Li.pdf
PDF
6 years ago
13.81 MB
Copy Link
D1T1 - Hunting for Backdoors in IoT Firmware at Unprecedented Scale - John Toterhi.pdf
PDF
6 years ago
4.04 MB
Copy Link
D1T1 - Infecting Files On The Fly - Leonardo Nve.pdf
PDF
6 years ago
7.26 MB
Copy Link
D1T1 - Rooting Routers Using Symbolic Execution - Mathy Vanhoef.pdf
PDF
6 years ago
1.72 MB
Copy Link
D1T1 - The Phantom Menace- Intel ME Manufacturing Mode - Maxim Goryachy and Mark Ermolov.pdf
PDF
6 years ago
22.07 MB
Copy Link
D1T1 - Virtualizing IoT With Code Coverage Guided Fuzzing - Lau Kai Jern and Nguyen Anh Quynh.pdf
PDF
6 years ago
8.63 MB
Copy Link
D1T2 - A Multidimensional Hardware Attack and Defense Tool Set - Kunzhe Chai, Jie Fu and Mingchuang Qin.pdf
PDF
6 years ago
6.30 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.