Cloud computing security
CRAXweb: Automatic Exploit Generation for Web Applications
TPC-H in MongoDB
Botnets 101
Data mining & column stores
Network switching
Private Browsing: A Window of Forensic Opportunity
Web application security: Threats & Countermeasures
Digital Forensic: Brief Intro & Research Challenge
Partitioned Based Regression Verification
Introduction to Common Weakness Enumeration (CWE)
Analysis of hybrid image with FFT (Fast Fourier Transform)
Bioinformatics for Computer Scientists