Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
D2T2 - Capture This - Real Time Packet Processing with FPGAs - Matteo Collura.pdf
Home
/
Discover
/
conference.hitb.org
/
hitbsecconf2018dxb
/
materials
/
Parent Folder
D2T2 - Capture This - Real Time Packet Processing with FPGAs - Matteo Collura.pdf
PDF
6 years ago
5.20 MB
Copy Link
D2T2 - Back On The Chain Gang - Blockchain, Public Chain and Contract Security - Li Jiafeng and Yang Changcheng.pdf
PDF
6 years ago
17.52 MB
Copy Link
D2T2 - NTLM Relay Is Dead Long Live NTLM Relay - Jianing Wang and Junyu Zhou.pdf
PDF
6 years ago
26.06 MB
Copy Link
D2T2 - Are You Listening? Auditable & Provable Privacy of Smart Speakers - Wang Kang and Yang Bo.pdf
PDF
6 years ago
Get Size
Copy Link
D2T2 - Using Machine-Learning to Investigate Web Campaigns at Large - Federico Maggi.pdf
PDF
6 years ago
10.07 MB
Copy Link
D2T1 - Vote of No Confidence - Second Factor Correctness - Victor Mateu.pdf
PDF
6 years ago
2.65 MB
Copy Link
D2T1 - It WISNβt Me - Attacking Industrial Wireless Mesh Networks - Mattijs van Ommeren and Erwin Patternote.pdf
PDF
6 years ago
1.83 MB
Copy Link
D2T1 - Horror On The Bus - Hacking COMBUS - Kirils Solovjovs.pdf
PDF
6 years ago
6.69 MB
Copy Link
D2T1 - GLitch Chronicles - Turning WebGL Into A Hammer - Pietro Frigo.pdf
PDF
6 years ago
26.91 MB
Copy Link
D2T1 - DHCP is Hard - Felix Wilhelm.pdf
PDF
6 years ago
422.32 kB
Copy Link
D2 KEYNOTE - Cyber Arms Race - Mikko Hypponen.pdf
PDF
6 years ago
3.86 MB
Copy Link
D2 COMMSEC - Offensive Memory Forensics - Hugo Teso.pdf
PDF
6 years ago
29.88 MB
Copy Link
D2 COMMSEC - Improved Blockchain Infrastructure with IoT - Dr Manar Abu Talib and Dr Qassim Nasir.pdf
PDF
6 years ago
18.96 MB
Copy Link
D2 COMMSEC - Hacking the International RFQ Process - Dino Covotsos.pdf
PDF
6 years ago
4.14 MB
Copy Link
D2 COMMSEC - HWallet - The Simple Cryptocurrency Hardware Wallet - Nemanja Nikodijevic.pdf
PDF
6 years ago
575.96 kB
Copy Link
D2 COMMSEC - Evolution of Security Threats to Telecommunications Infrastructures - Emmanuel Gadaix.pdf
PDF
6 years ago
27.22 MB
Copy Link
D2 COMMSEC - A Secured and Robust Wireless Communication System for Low-Latency Applications - Dr Husameldin Mukhtar.pdf
PDF
6 years ago
21.02 MB
Copy Link
D2 BSIDES - Women in Cybersecurity - Heide Young.pdf
PDF
6 years ago
13.34 MB
Copy Link
D2 BSIDES - My Experience of Running CTF Competitions in 7 Arab Countries - Moataz Salah.pdf
PDF
6 years ago
3.53 MB
Copy Link
D2 BSIDES - Hunting Threats in Your Enterprise - Abdulrahman Alnimari.pdf
PDF
6 years ago
20.68 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.