Index of /docs/Slides/2022

Icon  Name                                                                                                                                            Last modified      Size  Description
[PARENTDIR] Parent Directory - [   ] Attacking_Developer_Environment_Through_Drive-by_Localhost_Attacks_Joseph_Beeton.pdf 2022-12-17 00:13 2.1M [   ] Auditing_Closed_Source_Trusted_Applications_for_Qualcomm_Secure_Execution_Environment_(QSEE)_Hector Marco_&_Fernando_Vano.pdf 2022-11-30 23:41 9.3M [   ] Communicative_Incident_Response_Hauke_Gierow_Paul_Gärtner.pdf 2023-01-10 23:44 4.5M [   ] Cypher_Query_Injection_Noy_Pearl.pdf 2022-11-30 23:41 6.3M [   ] Detecting_the_Unknowns-Mobile_Network_Operators_Cyber_Resilience_In_Responding_To_0-day_Exploit_Imran_Saleem.pdf 2022-12-17 00:14 2.5M [   ] End-to-end_Health_Data_Privacy_Using_Secure_5G_Data_Channels_-_Dr_Razvan_Bocu.pdf 2022-11-30 23:41 1.8M [   ] Faking_at_Level_1_Thomas_Weber.pdf 2022-11-30 23:41 912K [   ] Fighting_Fire_With_Fire_–_Detecting_DNS-tunneling_With_DNS_Artsiom_Holub.pdf 2023-01-10 23:46 6.7M [   ] GitHub_Actions_Security_Landscape_Ronen_Slavin.pdf 2022-11-30 23:41 7.2M [   ] Hacker_To_Honcho_Darren_Jones_Julian_Botham.pdf 2023-01-10 23:47 17M [   ] Hacking_More_Secure_Portable_Storage_Devices_Matthias_Deeg.pdf 2022-11-30 23:41 8.1M [   ] Identification_of_the_Location_in_the_5G_Network_Giorgi_Akhalaia.pdf 2022-11-30 23:41 9.4M [   ] Iran_A_Top_Tier_Cyber_Threat_Actor_Steph_Shample.pdf 2022-11-30 23:41 592K [DIR] Keynote_-_Complexity_killed_the_Cat/ 2022-12-30 12:11 - [   ] Keynote_-_Complexity_killed_the_Cat_-_René_Pfeiffer.pdf 2022-11-30 23:41 7.7M [   ] Machine_Learning_Use_In_OSINT_Giorgi_Iashvili.pdf 2022-11-30 23:41 711K [   ] Malware_and_Exfiltration_:_A_Telegram_Story_Godwin_Attigah.pdf 2022-11-30 23:41 5.9M [   ] Melting_the_DNS_Iceberg_Timo_Longin.pdf 2023-01-10 23:47 4.1M [   ] OPSEC-The_Discipline_Of_The_Grey_Man_Robert_Sell.pdf 2022-11-30 23:42 5.4M [   ] Post-quantum_Verkle_Signature_Scheme_Maksim_Iavich.pdf 2022-11-30 23:42 3.1M [   ] Protecting_Your_Web_Application_API_With_CrowdSec_Klaus_Agnoletti.pdf 2022-11-30 23:42 6.6M [   ] Signature_Based_Detection_Using_Network_Timing_Josh_Pyorre.pdf 2022-12-17 00:15 37M [   ] The_Need_For_a_Human_Touch_In_Cyber_Security_Erlend_Andreas_Gjære .pdf 2022-12-17 00:14 2.0M [   ] Towards_The_Automation_Of_Highly_Targeted_Phishing_Attacks_With_Adversarial_Artificial_Intelligence_Francesco_ Morano_ and_ Enrico_Frumento.pdf 2023-01-10 23:48 3.0M [   ] Ukrainian-Russian_Warfare_In_Cyberspace_Sergiy_Gnatyuk .pdf 2022-12-17 00:14 5.7M [   ] Vanquish_Analysis_Everywhere_With_Smartphones_Hiroyuki_Kakara.pdf 2022-11-30 23:42 4.4M [   ] We_are_sorry_that_your_mouse_is_admin_Oliver_Schwarz.pdf 2022-12-17 00:13 2.1M [   ] Wireless_Keystroke_Injection_As_An_Attack_Vector_During_Physical_Assessments_Simonovi_Sergei.pdf 2022-12-17 00:13 3.8M