Big Data Big Picture - Professor Derek Bell
Incident Response: Network Forensics
Eie rolling display
Telecommunications: Wireless Networks
8. Telecommunications: Images (JPEG/DCT)
Incident response: Introduction
SIEM Part II - External Threat Analysis Tool
Incident Response: SIEM Part II
Incident Response: Tunnelling
Blockchain and Health - James Little-john
Secure Networking in Big Data Environments
Big Data in Cyber Security
SIEM
JAKU Botnet Analysis
The Cyber Academy Presentation on Scottish Cyber Hub
Images (GIF)
Machine Learning for Threat Detection
Big Data Shouldn't Be Big
Using Big Data to Create Engagement Agility
Design and Evaluation of [vSoC]: Virtualised Security Operations Centre