Understanding Cross-site Request Forgery
The Real Internet of Things: How Universal Daemonization Will Change Everything
RSA2015: Securing the Internet of Things
IoT Attack Surfaces -- DEFCON 2015
Peak Prevention: Moving from Prevention to Resilience
Implementing Inexpensive Honeytrap Techniques
Securing Medical Devices Using Adaptive Testing Methodologies
The Game Security Framework
Evolution of The Application
SecLists @ BlackHat Arsenal 2015
Adaptive Testing Methodology [ ATM ]