Security-Assessment.com Copyright Security-Assessment.com 2003 A Step into the Computer Underground By Understanding The Enemy We Are Better Prepared To.
2008-7-31 Guofei Gu BotMiner BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Guofei Gu 1,2,
Secure Email and Web Browsing Sébastien Dellabella – Computer Security Team.
A Compliance Framework for Credit Card Security Gabriel Dusil SecureWorks Inc. Director Partnerships, EMEA cz.linkedin.com/in/gabrieldusil.
nullcon 2011 - Botnet Detection approach by DNS behavior and clustering analysis
Security Assessment
AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies
Symantec Intelligence Report November 2014
Network Security Fundamental
An inside look at Skynet, a Tor based botnet
The Evolution of the Fileless Click-Fraud Malware Poweliks
Ireland’s National Police Service Virus – Remove Ukash Ransomware from Windows