Attackers Move Stealthily Around Networks - And How To Detect Them
Fight Back Against Java Exploits, Spear-Phishing, Watering Hole Attacks, Drive-by Downloads, Scare-ware, Ransomware, Social Networking Worms…ah…. CHADD.
Fight Back Against Java Exploits, Spear-Phishing, Watering Hole Attacks, Drive-by Downloads, Scare-ware, Ransomware, Social Networking Worms…ah…. PJ BIHUNIAK.
Battista Biggio @ S+SSPR2014, Joensuu, Finland -- Poisoning Complete-Linkage Hierarchical Clustering
The Big Game: You vs. Malware
Michael Crosno (Security Landscape) Geekfest
Attackers are getting Smarter than Defenders - Internet Security
Intelligence report-06-2015.en-us[1]
Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”