Preprocessing Techniques for Computing Nash Equilibria Vincent Conitzer Duke University Based on: Conitzer and Sandholm. A Generalized Strategy Eliminability.
Unbound:Endless War
Handle Explotion of Remote System Without Being Online (Merchant Bhaumik)
Mordheim Scenario Master List
Attacks on DHCP and DNS Most slides used with persmission from CS 161: Computer Security Prof. Vern Paxson University of California, Berkeley.