StealthWatch & Point-of-Sale (POS) Malware
9781849517744_Chapter_8_Bypassing_Firewalls_and_Avoiding_Detection_Sample_Chapter
White Paper: Safeguarding tomorrow’s trustworthy ICT environment – the importance of research in ICT security
Android security
History of some Vulnerabilities and exploit techniques
Cybersecurity nl
CS 590M: Security Issues in Data Mining
FP7 Legal Aspects (March 2007)
Graphical Password Authentication
3TU.NIRICT
Big Data for Defense and Security
© Charles W. Wessner, PhD1 Innovation, Security & Growth Perspectives from the U.S. Innovation System Myths, Realities & Opportunities Six Countries Programme.