×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
D2 KEYNOTE - Machine Learning in Cybersecurity - Alexander Polyakov.pdf
Home
/
Discover
/
paper.bobylive.com
/
Meeting_Papers
/
HITB
/
2018
/
Parent Folder
D2 KEYNOTE - Machine Learning in Cybersecurity - Alexander Polyakov.pdf
PDF
4 years ago
17.06 MB
Copy Link
D2 COMMSEC - Using Machine Learning to Identify Security Issues in Open-Source Libraries - Asankhaya Sharma.pdf
PDF
4 years ago
1.19 MB
Copy Link
Exploiting Automation in LTE Mobile Networks - Altaf Shaik & Ravishankar Borgaonkar.pdf
PDF
4 years ago
561.68 kB
Copy Link
D2 COMMSEC - Software Security Era - Past, Present and Future - Nafiez & Jaan Yeh.pdf
PDF
4 years ago
3.35 MB
Copy Link
FILE Structures - Another Binary Exploitation Technique - An-Jie Yang.pdf
PDF
4 years ago
4.04 MB
Copy Link
D2 COMMSEC - Monitoring Native Execution in WoW64 Applications - Assaf Carlsbad & Yarden Shafir.pdf
PDF
4 years ago
2.13 MB
Copy Link
D2 COMMSEC - Learning How to Smurf with Honeypots - Emil Tan.pdf
PDF
4 years ago
1.96 MB
Copy Link
Hardware Backdoors in x86 CPUs - Christopher Domas.pdf
PDF
4 years ago
633.68 kB
Copy Link
D2 COMMSEC - Internet of Things - Battle of the Bots - Rommel Joven.pdf
PDF
4 years ago
2.62 MB
Copy Link
NFC Payments - The Art of Relay and Replay Attacks - Salvador Mendoza.pdf
PDF
4 years ago
663.04 kB
Copy Link
D2 COMMSEC - Hacking Mobile Games - Closing the Gap Between Ikan Bilis and Whales - Nicholas Lim.pdf
PDF
4 years ago
2.71 MB
Copy Link
The Road to iOS Sandbox Escape - Rani Idan.pdf
PDF
4 years ago
573.86 kB
Copy Link
D2 COMMSEC - Data-Centric Cyber Threat Impact Analyser for IoT and Manufacturing - Simon Eng & Lim Eng Woei.pdf
PDF
4 years ago
11.89 MB
Copy Link
D2 COMMSEC - Cognitive Automation With Machine Learning in Cyber Security - Rishi Kant.pdf
PDF
4 years ago
5.37 MB
Copy Link
D2 COMMSEC - Blockchain and Smart Contract Attack Vectors - Jorden Seet.pdf
PDF
4 years ago
1.53 MB
Copy Link
D2 - Traversing the Kill-Chain - The New Shiny in 2018 - Vincent Yiu.pdf
PDF
4 years ago
2.85 MB
Copy Link
D2 - The Road to iOS Sandbox Escape - Rani Idan.pdf
PDF
4 years ago
8.15 MB
Copy Link
D2 - NFC Payments - The Art of Relay & Replay Attacks - Salvador Mendoza.pdf
PDF
4 years ago
2.92 MB
Copy Link
D2 - Hacking BLE Bicycle Locks for Fun and (a Small) Profit - Vincent Tan.pdf
PDF
4 years ago
4.55 MB
Copy Link
D2 - Decoding an iOS Vulnerability - Adam Donenfeld.pdf
PDF
4 years ago
2.82 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.