Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

    SlideShare
  • Slideshare-64x64 Home
  • Explore
  • Search
    • You
  • Upload
  • Login
  • Signup
  • Home
  • Explore
×
×
×
×
×
×

CODE BLUE

  • Following Follow   Processing…
  • 204 SlideShares
  • 274 Followers
  • 0 Clipboards

Modal header

One fine body…

  • 204 presentations
  • documents
  • videos
  • infographics
  • Latest
  • Most Popular
  • [CB19] Deep Exploit: Fully Automatic Penetration Test Tool Using Reinforcement Learning by Isao Takaesu [CB19] Deep Exploit: Fully Au... 1 year ago 2,109 views
  • [CB19] S-TIP: サイバー脅威インテリジェンスのシームレスな活用プラットフォーム by 山田 幸治, 里見 敏孝 [CB19] S-TIP: サイバー脅威インテリジェンスの... 1 year ago 1,310 views
  • [CB19] New threats are already around you, the IPV6 attack must be understood by Jie Fu, KunZhe Chai, YongTao Wang [CB19] New threats are alread... 1 year ago 340 views
  • [CB19] MalCfgParser: A Lightweight Malware Configuration Parsing Tool by Ycy Yu, Duckll Liao, Charles Li [CB19] MalCfgParser: A Lightw... 1 year ago 449 views
  • [CB19] Wifi sniffing with the WifiKraken by Mike Spicer [CB19] Wifi sniffing with the... 1 year ago 249 views
  • [CB19] Autopsyで迅速なマルウェアのスキャンとディスク内の簡単調査 by ターナー・功 [CB19] Autopsyで迅速なマルウェアのスキャンと... 1 year ago 1,146 views
  • [CB19] CIRCO: Cisco Implant Raspberry Controlled Operations by Emilio Couto [CB19] CIRCO: Cisco Implant R... 1 year ago 423 views
  • [CB19] Shattering the dark: uncovering vulnerabilities of the dark web by Takahiro Yoshimura, Ken-ya Yoshimura [CB19] Shattering the dark: u... 1 year ago 149 views
  • [CB19] MalConfScan with Cuckoo: Automatic Malware Configuration Extraction System by Tomoaki Tani, Shusei Tomonaga [CB19] MalConfScan with Cucko... 1 year ago 234 views
  • [CB19] tknk_scanner v2:community-based integrated malware identification system by Shota Nakajima, Keita Nomura [CB19] tknk_scanner v2:commun... 1 year ago 106 views
  • [CB19] FileInsight-plugins: Decoding toolbox for malware analysis by 萬谷 暢崇 [CB19] FileInsight-plugins: D... 1 year ago 281 views
  • [CB19] Cyber Threat Landscape in Japan – Revealing Threat in the Shadow by  Chi En Shen (Ashley) Oleg Bondarenko [CB19] Cyber Threat Landscape... 1 year ago 4,236 views
  • [CB19] Applicability of GDPR and APPI to international companies and the impact on IT Security [CB19] Applicability of GDPR ... 1 year ago 313 views
  • [CB19] From Advanced Persistent Threats to "Advanced Persistent Manipulators": The Evolving Cyber Defense Battlefield by Mei Nelson [CB19] From Advanced Persiste... 1 year ago 254 views
  • [CB19] Recent APT attack on crypto exchange employees by Heungsoo Kang [CB19] Recent APT attack on c... 1 year ago 630 views
  • [CB19] Integration of Cyber Insurance Into A Risk Management Program by Jake Kouns [CB19] Integration of Cyber I... 1 year ago 103 views
  • [CB19] Hardware Wallet Security [CB19] Hardware Wallet Security 1 year ago 91 views
  • [CB19] Coinbase and the Firefox 0-day by Philip Martin [CB19] Coinbase and the Firef... 1 year ago 129 views
  • [CB19] API-induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web by Joshua Maddux [CB19] API-induced SSRF: How ... 1 year ago 269 views
  • [CB19] Semzhu-Project – A self-made new world of embedded hypervisors and attack detection methods by Yoshifumi Shu (Yiwen Zhu) [CB19] Semzhu-Project – A sel... 1 year ago 103 views
  • 1
  • 2
  • 3
  • …
  • 10
  • 11
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • About
  • Developers & API
  • Blog
  • Terms
  • Privacy
  • Copyright
  • Support
RSS Feeds