Helbing nature-2013
Havoc
Bailey (2009, us congress) iranian penetration into the western hemisphere through venezuela
2012 flash aslr bypass
Win8 (2013) reversing windows8 interesting features of kernel security
Gross o. carl schmitt's theory of emergency powers
Joac jan 2012 signed
Shao (2012] [num, optimization] reverse engineering bit torrent- a markov approximation perspective
Forrester tlp the value of corporate secrets
Nerc (2010) high impicat low probability events us power grid
Nerc (2010) high impact low probability events us power grid
Jester dynamic-lesson-asymmetric-unmanaged-cyber-warfare 33889
Kan (2008) drug intoxicated irregular fighters complications, dangers, and responses
RAID 2012 Memory errors past present future
Group ib (2012) russian market group-ib report-2011_eng
Scada attack summary (2012)
3755.microsoft study into b70
Morgenstern (2010) turing machines with two letters and two states
Inform ation security oversight office 2011costs
Dainotti (2012) internet background radiation (ibr)