Red teaming the CCDC
Anatomy of a cyber attack
Mobile analysis-kung-fu-santoku-style-viaforensics-rsa-conference-2014
Credential Assessment - Mapping Privilege Escalation at Scale
PACE-IT: Introduction_to Network Devices (part 2) - N10 006
Malware original slides provided by Prof. Vern Paxson University of California, Berkeley.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Silvio Cesare [email protected]@gmail.com Ph.D. Candidate, Deakin University.
DroidChameleon : Evaluating Android Anti-malware against Transformation A ttacks