考研资料大全
开通大会员文档免费下
扫一扫安装书房APP
扫一扫关注微信号
Discovering-And-Exploiting-Novel-Security-Vulnerabilities-In-Apple-Zeroconf
The-Remote-Malicious-Butler-Did-It
Exploiting-Curiosity-And-Context-How-To-Make-People-Click-On-A-Dangerous-Link-Despite-Their-Security-Awareness
An-AI-Approach-To-Malware-Similarity-Analysis-Mapping-The-Malware-Genome-With-A-Deep-Neural-Network
SGX-Secure-Enclaves-In-Practice-Security-And-Crypto-Review
Using-EMET-To-Disable-EMET
Memory-Forensics-Using-VMI-For-Cloud-Computing
Windows-10-Mitigation-Improvements
Blunting-The-Phishers-Spear-A-Risk-Based-Approach-For-Defining-User-Training-And-Awarding-Administrative-Privileges
Captain-Hook-Pirating-AVs-To-Bypass-Exploit-Mitigations
HEIST-HTTP-Encrypted-Information-Can-Be-Stolen-Through-TCP-Windows
Windows-10-Segment-Heap-Internals
Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter
Breaking-Payment-Points-of-Interaction
A-Worm-Living-Solely-In-The-PLC
The-Year-In-Flash
Whats-The-DFIRence-For-ICS
Terwoerds-Building-Trust-&-Enabling-Innovation-For-Voice-Enabled-IoT
Language-Properties-Of-Phone-Scammers-Cyberdefense-At-The-Level-Of-The-Human
Can-You-Trust-Me-Now