"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения". Юрий Леонычев, Яндекс
Code obfuscation, php shells & more
Asc overview 7 8-13
Comparative Analysis of Personal Firewalls
Generic Solving Of Text Based Captcha
3. APTs Presentation
BSIDESLV Secret Pentesting Techniques
Text Based Captcha Strengths and Weaknesses
Detecting Software Theft via System Call Based Birthmarks Xinran Wang, Yoon-Chan Jhi, Sencun Zhu, Peng Liu ACSAC 2009.
Assessing the Nature of Internet traffic: Methods and Pitfalls Wolfgang John Chalmers University of Technology, Sweden together with Min Zhang Beijing.
SMT Solvers for Malware Unpacking