Aggregator
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 2: Going off on a Tangent – AI/ML Applications in Social Engineering
1 year 2 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 3: Understanding Existing Approaches and Attempts
1 year 2 months ago
Professional C Programming LiveLessons, (Video Training) Part I: Writing Robust, Secure, Reliable Code
1 year 2 months ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 1: Understanding the Basics and What Platforms and Frameworks Are Available
1 year 2 months ago
Preparing for Cyber Battleships – Electronic Chart Display and Information System Security
1 year 2 months ago
Principal Mapper (pmapper)
1 year 2 months ago
Private sector cyber resilience and the role of data diodes
1 year 2 months ago
Premium Security Content Gateway
1 year 2 months ago
Premium Practical Law Content Gateway
1 year 2 months ago
Premium Practical Law Content Gateway(2)
1 year 2 months ago
Practical Machine Learning for Random (Filename) Detection
1 year 2 months ago
Practical SME security on a shoestring
1 year 2 months ago
Premium Content Gateway
1 year 2 months ago
Potential false redirection of web site content in Internet in SAP NetWeaver web applications
1 year 2 months ago
Practical Considerations of Right-to-Repair Legislation
1 year 2 months ago
Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817
1 year 2 months ago
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
1 year 2 months ago
Post-quantum cryptography overview
1 year 2 months ago
Popping Blisters for research: An overview of past payloads and exploring recent developments
1 year 2 months ago