Towards secure and dependable storage service in cloud
DSS ITSEC 2013 Conference 07.11.2013 - Security in High Risk Environment
Anatomy of a cyber attack
Why Application Control is Vital for IT Security
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training Data Poisoning?"
Using Intelligent Whitelisting to Effectively and Efficiently Combat Today’s Endpoint Malware
© 2014, FireEye, Inc. All rights reserved. 1 Tobin Sears, FireEye Zero-Days, Ghost Malware, and Other Current Trends.
OWASP AppSensor Project Real-time attack detection and response