首页
版块
搜索
注册
|
登录
精品仓库
/
各安全大会、安全沙龙的演讲内容,安全白皮书、安全研究报告、安全免费图书、安全指南等
返回
加入收藏
举报
FeeiCN
02-25 11:14
#0
The repository contains the slides of the security conference, as well as all kids of security white paper, security research report, security free books, security guide and so on.
本仓库收录各安全大会、安全沙龙的演讲内容,以及各类安全白皮书、安全研究报告、安全免费图书、安全指南等。
first_2015_-_behind_the_scenes.pptx
first_2015_-_bongertz-_jasper_-_needle_in_the_haystack_20150527.pptx
first_2015_-_cormack-_andrew_-_privacy_and_ir_v0-16_20150513_fw.pdf
first_2015_-_cormack-_andrew_-_privacy_and_ir_v0-16_20150513_fw.pdf.md
first_2015_-_dileepa_lathsara_-_sector_based_cyber_security_drills_20150610.pdf
first_2015_-_dileepa_lathsara_-_sector_based_cyber_security_drills_20150610.pdf.md
first_2015_-_eireann-_moe_-_i-m_sorry_to_inform_you_20150610_fw.pdf
first_2015_-_eireann-_moe_-_i-m_sorry_to_inform_you_20150610_fw.pdf.md
first_2015_-_gagnon-_katherine_-_cyber_intelligence_professional_20150501_fw.pdf
first_2015_-_gagnon-_katherine_-_cyber_intelligence_professional_20150501_fw.pdf.md
first_2015_-_goldfarb-_joshua_-_narrativedrivenmodel_20150331_fw.pdf
first_2015_-_goldfarb-_joshua_-_narrativedrivenmodel_20150331_fw.pdf.md
first_2015_-_gordon-_mike_-_enabling_i_g1_g62nnovation_in_cyber_security__20150604_fw.pdf
first_2015_-_gordon-_mike_-_enabling_i_g1_g62nnovation_in_cyber_security__20150604_fw.pdf.md
first_2015_-_gordon-_mike_-_enabling_i_g1_g62nnovation_in_cyber_security__20150615_fw.pdf
first_2015_-_gordon-_mike_-_enabling_i_g1_g62nnovation_in_cyber_security__20150615_fw.pdf.md
first_2015_-_grance-_millar-_pawlinski-_dandurand-_brown_-_cyber_threat_information_sharing_20150615.pptx
first_2015_-_hanford-_seth_-_cvss_v3_hands-on_training_20150529_fw.pdf
first_2015_-_hanford-_seth_-_cvss_v3_hands-on_training_20150529_fw.pdf.md
first_2015_-_harrington-_michael_-_incident_response_20150614_fw.pdf
first_2015_-_harrington-_michael_-_incident_response_20150614_fw.pdf.md
first_2015_-_herberg-_frank_-_ipv6_security_20150604.pdf
first_2015_-_herberg-_frank_-_ipv6_security_20150604.pdf.md
first_2015_-_hjelmvik-_erik_-_hands-on_network_forensics_20150604.pdf
first_2015_-_hjelmvik-_erik_-_hands-on_network_forensics_20150604.pdf.md
first_2015_-_horne-_bill_-_enterprise_scale_dns_events_20150526_fw.pdf
first_2015_-_horne-_bill_-_enterprise_scale_dns_events_20150526_fw.pdf.md
first_2015_-_horsley-_leung_-_dsms_20150604.pdf
first_2015_-_horsley-_leung_-_dsms_20150604.pdf.md
first_2015_-_iklody-_andras_-_building_instantly_exploitable_protection_20150608_fw.pdf
first_2015_-_iklody-_andras_-_building_instantly_exploitable_protection_20150608_fw.pdf.md
first_2015_-_johnson-_george-_boline-_wayne-_anderso_-_technology-_trusts_20150529_fw.pdf
first_2015_-_johnson-_george-_boline-_wayne-_anderso_-_technology-_trusts_20150529_fw.pdf.md
first_2015_-_kouns_-_eiram_-_byoiot_v4_20150611_fw.pdf
first_2015_-_kouns_-_eiram_-_byoiot_v4_20150611_fw.pdf.md
first_2015_-_kouns_-_eiram_-_byoiot_v4_20150615_fw.pdf
first_2015_-_kouns_-_eiram_-_byoiot_v4_20150615_fw.pdf.md
first_2015_-_leverett-_moe_-_i-m_sorry_to_inform_you_20150615.pdf
first_2015_-_leverett-_moe_-_i-m_sorry_to_inform_you_20150615.pdf.md
first_2015_-_masduki-_bisyron_-_implementation_of_machine__20150603_fw.pdf
first_2015_-_masduki-_bisyron_-_implementation_of_machine__20150603_fw.pdf.md
first_2015_-_millar-_tom_-_a_funny_thing_happened_on_the_way_to_oasis_20150611_fw.pdf
first_2015_-_millar-_tom_-_a_funny_thing_happened_on_the_way_to_oasis_20150611_fw.pdf.md
first_2015_-_park-_jinwan_-_study_on_the_categorization_of_webshell__20150610.pdf
first_2015_-_park-_jinwan_-_study_on_the_categorization_of_webshell__20150610.pdf.md
first_2015_-_perl-_sam_-_incidenthandlingfirst_final_20150611.pptx
first_2015_-_perl-_woods-_millar_-_discovering_patterns_of_activity__20150603.pdf
first_2015_-_perl-_woods-_millar_-_discovering_patterns_of_activity__20150603.pdf.md
first_2015_-_pfleger-_shari_-_csirt_info_sharing_workshop_20150528_fw.pdf
first_2015_-_pfleger-_shari_-_csirt_info_sharing_workshop_20150528_fw.pdf.md
first_2015_-_pinto-_alex-_sierira-_alex_-_data-driven_threat_intelligence_20150529.pdf
first_2015_-_pinto-_alex-_sierira-_alex_-_data-driven_threat_intelligence_20150529.pdf.md
first_2015_-_railton-_reneaue_-_business_process_and_incident_response_collide_20150604.pptx
first_2015_-_rasmussen-_rod_-_cutting_through_cyberthreat_intelligence_noise_20150612_fw.pdf
first_2015_-_rasmussen-_rod_-_cutting_through_cyberthreat_intelligence_noise_20150612_fw.pdf.md
first_2015_-_reid-_gavin_-__threat_intelligence_function_20150605_fw.pdf
first_2015_-_reid-_gavin_-__threat_intelligence_function_20150605_fw.pdf.md
first_2015_-_reid-_gavin_-__threat_intelligence_function_20150615_fw.pdf
first_2015_-_reid-_gavin_-__threat_intelligence_function_20150615_fw.pdf.md
first_2015_-_soman-_bhavna_-_evaluating_the_effectiveness_of_fuzzy_hashing_techniques_20150610.pdf
first_2015_-_soman-_bhavna_-_evaluating_the_effectiveness_of_fuzzy_hashing_techniques_20150610.pdf.md
first_2015_-_steinke-_julie-_fletcher-_laura-_repchick-_kristin_m._-_barriers_and_pathways_20150529_fw.pdf
first_2015_-_steinke-_julie-_fletcher-_laura-_repchick-_kristin_m._-_barriers_and_pathways_20150529_fw.pdf.md
first_2015_-_uchiyama-_kobayashi_-_keeping_eyes_on_malicious_websites_20150604.pdf
first_2015_-_uchiyama-_kobayashi_-_keeping_eyes_on_malicious_websites_20150604.pdf.md
first_2015_-_valites_-_bollinger_-_how_we_saved_the_death_star_20150608_-_fw.pdf
first_2015_-_valites_-_bollinger_-_how_we_saved_the_death_star_20150608_-_fw.pdf.md
first_2015_-_van_wyk-_kenneth_-_pen_testing_ios_apps_20150602_fw.pdf
first_2015_-_van_wyk-_kenneth_-_pen_testing_ios_apps_20150602_fw.pdf.md
first_2015_-_weber-_jean-paul_-_ce1sus_20150615.pdf
first_2015_-_weber-_jean-paul_-_ce1sus_20150615.pdf.md
first_2015_-_zielinski-_eric_-_incident_response_programming_with_r_20150612_fw.pdf
first_2015_-_zielinski-_eric_-_incident_response_programming_with_r_20150612_fw.pdf.md
presentation_first_2015_part1.pptx_-_presentation_first_2015_part1-1-low_fw.pdf
presentation_first_2015_part1.pptx_-_presentation_first_2015_part1-1-low_fw.pdf.md
presentation_first_2015_part2.pdf
presentation_first_2015_part2.pdf.md
1-The-Official-Home-for-IPv6-Attacks.pdf
1-The-Official-Home-for-IPv6-Attacks.pdf.md
AIL-Framework-Analysis-Information-Leak-Framework.pdf
AIL-Framework-Analysis-Information-Leak-Framework.pdf.md
APT-Log-Analysis-Tracking-Attack-Tools-by-Audit-Policy-and-Sysmon.pdf
APT-Log-Analysis-Tracking-Attack-Tools-by-Audit-Policy-and-Sysmon.pdf.md
Active-Directory-How-To-Change-a-Weak-Point-Into-a-Leverage-for-Security-Monitoring.pdf
Active-Directory-How-To-Change-a-Weak-Point-Into-a-Leverage-for-Security-Monitoring.pdf.md
Advanced-Incident-Detection-and-Threat-Hunting-using-Sysmon-and-Splunk.pdf
Advanced-Incident-Detection-and-Threat-Hunting-using-Sysmon-and-Splunk.pdf.md
Building-a-Product-Security-Team_The-Good-the-Bad-and-the-Ugly-Lessons-from-the-Field.pdf
Building-a-Product-Security-Team_The-Good-the-Bad-and-the-Ugly-Lessons-from-the-Field.pdf.md
Building-a-Threat-Hunting-Framework-for-the-Enterprise.pdf
Building-a-Threat-Hunting-Framework-for-the-Enterprise.pdf.md
Collaborative-Information-Sharing-Model-for-Malware-Threat-Analysis.pdf
Collaborative-Information-Sharing-Model-for-Malware-Threat-Analysis.pdf.md
Countering-Innovative-Sandbox-Evasion-Techniques-Used-by-Malware.pdf
Countering-Innovative-Sandbox-Evasion-Techniques-Used-by-Malware.pdf.md
Defensive-Evasion-How-APT-Adversaries-Bypass-Security-Controls.pdf
Defensive-Evasion-How-APT-Adversaries-Bypass-Security-Controls.pdf.md
Digital-Supply-Chain-The-Exposed-Flank-In-2017.pdf
Digital-Supply-Chain-The-Exposed-Flank-In-2017.pdf.md
Disrupting-IoT-Worms-in-Finland-2016-Edition.pdf
Disrupting-IoT-Worms-in-Finland-2016-Edition.pdf.md
Experiences-and-Lessons-Learned-from-a-Siemens-Wide-Security-Patch-Management-Service-for-Products.pdf
Experiences-and-Lessons-Learned-from-a-Siemens-Wide-Security-Patch-Management-Service-for-Products.pdf.md
Experiences-in-Threat-Data-Processing-and-Analysis-Using-Open-Source-Software.pdf
Experiences-in-Threat-Data-Processing-and-Analysis-Using-Open-Source-Software.pdf.md
FIRST2017-Conference-Program.pdf
FIRST2017-Conference-Program.pdf.md
Going-Undetected-How-Cybercriminals-Hacktivists-and-Nation-States-Misuse-Digital-Certificates.pdf
Going-Undetected-How-Cybercriminals-Hacktivists-and-Nation-States-Misuse-Digital-Certificates.pdf.md
Hajime-the-Mainline-DHT.pdf
Hajime-the-Mainline-DHT.pdf.md
Handling-an-Incident-in-CERT-EU.pdf
Handling-an-Incident-in-CERT-EU.pdf.md
Hey-You-Have-a-Problem-On-the-Feasibility-of-Large-Scale-Web-Vulnerability-Notification.pdf
Hey-You-Have-a-Problem-On-the-Feasibility-of-Large-Scale-Web-Vulnerability-Notification.pdf.md
How-To-Ruin-Your-Weekend-And-Business-In-Few-Simple-Steps.pdf
How-To-Ruin-Your-Weekend-And-Business-In-Few-Simple-Steps.pdf.md
Hunting-for-Threats-in-Academic-Networks.pdf
Hunting-for-Threats-in-Academic-Networks.pdf.md
Implementing-a-Country-wide-Sensor-Infrastructure-for-Proactive-Detection-of-Malicious-Activity.pdf
Implementing-a-Country-wide-Sensor-Infrastructure-for-Proactive-Detection-of-Malicious-Activity.pdf.md
Improving-Useful-Data-Extraction-from-Cybersecurity-Incident-Reports.pdf
Improving-Useful-Data-Extraction-from-Cybersecurity-Incident-Reports.pdf.md
Lean-Gains-Small-Team-Effectiveness.pdf
Lean-Gains-Small-Team-Effectiveness.pdf.md
Malicious-Proxy-Auto-Configs-Harvesting-Credentials-From-Web-Forms-Made-Easy.pdf
Malicious-Proxy-Auto-Configs-Harvesting-Credentials-From-Web-Forms-Made-Easy.pdf.md
Medical-Device-Security-A-Sucking-Chest-Wound-That-Needs-Emergency-Medicine.pdf
Medical-Device-Security-A-Sucking-Chest-Wound-That-Needs-Emergency-Medicine.pdf.md
Non-Formal-Everything-Out-of-Normal.pdf
Non-Formal-Everything-Out-of-Normal.pdf.md
Ozon-Running-a-Gap-Bridging-Cybercrisis-Exercise.pdf
Ozon-Running-a-Gap-Bridging-Cybercrisis-Exercise.pdf.md
Panel-Topic-Issues-Surrounding-Internet-of-Things-IoT-Security-Upgradibility-and-Patching.pdf
Panel-Topic-Issues-Surrounding-Internet-of-Things-IoT-Security-Upgradibility-and-Patching.pdf.md
Practical-Workflow-for-Automation-and-Orchestration-of-Addressing-Cyber.pdf
Practical-Workflow-for-Automation-and-Orchestration-of-Addressing-Cyber.pdf.md
PyNetSim-A-Modern-INetSim-Replacement.pdf
PyNetSim-A-Modern-INetSim-Replacement.pdf.md
Rio-2016-Olympic-CSIRT-Creation-Operation-and-Lessons-Learned.pdf
Rio-2016-Olympic-CSIRT-Creation-Operation-and-Lessons-Learned.pdf.md
Romeo-Chris-Appsec-Behaviors.pdf
Romeo-Chris-Appsec-Behaviors.pdf.md
The-Arrr-in-PSIRT.pdf
The-Arrr-in-PSIRT.pdf.md
The-Art-of-the-Jedi-Mind-Trick-Learning-Effective-Communication-Skills.pdf
The-Art-of-the-Jedi-Mind-Trick-Learning-Effective-Communication-Skills.pdf.md
The-Ransomware-Odyssey-Their-Relevance-and-Their-Kryptonite.pdf
The-Ransomware-Odyssey-Their-Relevance-and-Their-Kryptonite.pdf.md
Threat-Ontologies-for-Cyber-Security-Analytics.pdf
Threat-Ontologies-for-Cyber-Security-Analytics.pdf.md
Web-as-ongoing-threat-vector-case-studies-from-Europe-and-Asia-Pacific.pdf
Web-as-ongoing-threat-vector-case-studies-from-Europe-and-Asia-Pacific.pdf.md
You-Dont-Need-a-Better-Car-You-Need-to-Learn-How-to-Drive-On-the-Importance-of-Cyber-Defense-Line-Automation.pdf
You-Dont-Need-a-Better-Car-You-Need-to-Learn-How-to-Drive-On-the-Importance-of-Cyber-Defense-Line-Automation.pdf.md
You-re-Leaking-Incident-Response-in-the-World-of-DevOps.pdf
You-re-Leaking-Incident-Response-in-the-World-of-DevOps.pdf.md
01-APCERT_Presentation_2018.pdf
01-APCERT_Presentation_2018.pdf.md
02-SarojL-SecurityTrendsNepal.pdf
02-SarojL-SecurityTrendsNepal.pdf.md
05-YasunariMomoi-apricot2018-first-isogj.pdf
05-YasunariMomoi-apricot2018-first-isogj.pdf.md
06-NurulHusna-CyberDEF.pdf
06-NurulHusna-CyberDEF.pdf.md
08-JohnCrain-ICANN-DAAR_20180224.pdf
08-JohnCrain-ICANN-DAAR_20180224.pdf.md
11-SumonSaha-DNS-Firewall-with-RPZ-bdcert.pdf
11-SumonSaha-DNS-Firewall-with-RPZ-bdcert.pdf.md
20180206-TF-CSIRT-Hamburg-Final.pdf
20180206-TF-CSIRT-Hamburg-Final.pdf.md
20180227-Analyzing-24-Years-of-CVD-Allen-Householder-FIRST-PSIRT-TC.pdf
20180227-Analyzing-24-Years-of-CVD-Allen-Householder-FIRST-PSIRT-TC.pdf.md
Atlanta_PSIRT_TC_2018_VulStandards.pdf
Atlanta_PSIRT_TC_2018_VulStandards.pdf.md
Ballestero-Rosales-Susan_FIRST_20180619.pdf
Ballestero-Rosales-Susan_FIRST_20180619.pdf.md
Cular-Jurica_FIRST_20180605.pdf
Cular-Jurica_FIRST_20180605.pdf.md
Duncan-Jim_FIRST_20180626.pdf
Duncan-Jim_FIRST_20180626.pdf.md
EU-Cybercrime-Centre-Update.pdf
EU-Cybercrime-Centre-Update.pdf.md
Eian-Martin_FIRST_20180628.pdf
Eian-Martin_FIRST_20180628.pdf.md
FIRST-KL2018-MISP_TheHive_Cortex_Training_Instructions.pdf
FIRST-KL2018-MISP_TheHive_Cortex_Training_Instructions.pdf.md
FIRST-Symposium-2018-02-Atlanta-PSIRT-TC-Tabletops-with-Derrick.pdf
FIRST-Symposium-2018-02-Atlanta-PSIRT-TC-Tabletops-with-Derrick.pdf.md
FIRST-TC-PSIRT-Tools-v1.pdf
FIRST-TC-PSIRT-Tools-v1.pdf.md
Fischer-Thomas_FIRST_20180619.pdf
Fischer-Thomas_FIRST_20180619.pdf.md
Giese-Christoph_FIRST_20180620.pdf
Giese-Christoph_FIRST_20180620.pdf.md
Grenman-Thomas_FIRST_20180604.pdf
Grenman-Thomas_FIRST_20180604.pdf.md
Herberg-Frank_FIRST_20180624.pdf
Herberg-Frank_FIRST_20180624.pdf.md
Horejsi-Jaromir-Lunghi-Daniel__patchwork_FIRST_20180626.pdf
Horejsi-Jaromir-Lunghi-Daniel__patchwork_FIRST_20180626.pdf.md
Inglot-Bartosz-and-Wong-Vincent_FIRST_20180606.pdf
Inglot-Bartosz-and-Wong-Vincent_FIRST_20180606.pdf.md
Intro-PSIRT-Framework-Overview-2018-02-26.pdf
Intro-PSIRT-Framework-Overview-2018-02-26.pdf.md
Jung-Paul_FIRST_20180624.pdf
Jung-Paul_FIRST_20180624.pdf.md
Katagi-Masanobu-Uchiyama-Takayuki_FIRST_20180626.pdf
Katagi-Masanobu-Uchiyama-Takayuki_FIRST_20180626.pdf.md
Kinnari-Tomi_FIRST_20180624.pdf
Kinnari-Tomi_FIRST_20180624.pdf.md
Koji-Yamada-Kunihiko-Yoshimura-Ryusuke-Masuoka-Toshitaka-Satomi_FIRST_20180626.pdf
Koji-Yamada-Kunihiko-Yoshimura-Ryusuke-Masuoka-Toshitaka-Satomi_FIRST_20180626.pdf.md
Laukka-Lasse_FIRST_20180626.pdf
Laukka-Lasse_FIRST_20180626.pdf.md
Maestretti-Alex-and-Joshi-Swathi_FIRST_20180625.pdf
Maestretti-Alex-and-Joshi-Swathi_FIRST_20180625.pdf.md
Masuda-Haba-Kon-Kikuta-Hirata-Yamaguchi_FIRST_201806010.pdf
Masuda-Haba-Kon-Kikuta-Hirata-Yamaguchi_FIRST_201806010.pdf.md
Mature-PSIRTs-need-mature-Tools_TCAtlanta.pdf
Mature-PSIRTs-need-mature-Tools_TCAtlanta.pdf.md
MillarTom_Professionalizing-Cyber-Incident-Response-Slides-for-FIRST_20180621.pdf
MillarTom_Professionalizing-Cyber-Incident-Response-Slides-for-FIRST_20180621.pdf.md
MillarTom_TLP-to-IEP-Evolution-Slides-for-FIRST_20180621.pdf
MillarTom_TLP-to-IEP-Evolution-Slides-for-FIRST_20180621.pdf.md
Minigozzi-Andrea-Rossi-Antonio_FIRST_20180612.pdf
Minigozzi-Andrea-Rossi-Antonio_FIRST_20180612.pdf.md
Misner-Phillip_FIRST_20180627.pdf
Misner-Phillip_FIRST_20180627.pdf.md
Naropanth-Kumar-Securing-your-In-ear-_FIRST_20180608.pdf
Naropanth-Kumar-Securing-your-In-ear-_FIRST_20180608.pdf.md
Pawlinski-Pawel-WORKSHOP_FIRST_20180626.pdf
Pawlinski-Pawel-WORKSHOP_FIRST_20180626.pdf.md
Pinto-Alex_FIRST_20180624.pdf
Pinto-Alex_FIRST_20180624.pdf.md
Podins-Karlis_FIRST_201806019.pdf
Podins-Karlis_FIRST_201806019.pdf.md
Redmon-Gant_FIRST_20180607.pdf
Redmon-Gant_FIRST_20180607.pdf.md
ReferenceTaxonomy-FIRST.pdf
ReferenceTaxonomy-FIRST.pdf.md
Ridgway-Ben_FIRST_20180623.pdf
Ridgway-Ben_FIRST_20180623.pdf.md
SWITCH_DNS_Firewall_FIRST-TC_external.pdf
SWITCH_DNS_Firewall_FIRST-TC_external.pdf.md
Sailing-the-Seas-of-OpenSource.pdf
Sailing-the-Seas-of-OpenSource.pdf.md
Stanislav-Mark_FIRST_20180529.pdf
Stanislav-Mark_FIRST_20180529.pdf.md
Stenhall-Christer_FIRST_20180618.pdf
Stenhall-Christer_FIRST_20180618.pdf.md
TF-CSIRT-HH_Januar2018_final.pdf
TF-CSIRT-HH_Januar2018_final.pdf.md
Takata-Yuta_FIRST_20180531.pdf
Takata-Yuta_FIRST_20180531.pdf.md
The-GDPR-and-your-SIEM.pdf
The-GDPR-and-your-SIEM.pdf.md
Thomson-Allan_FIRST_20180602.pdf
Thomson-Allan_FIRST_20180602.pdf.md
Tyzenhaus-Laurie_FIRST_20180615.pdf
Tyzenhaus-Laurie_FIRST_20180615.pdf.md
Tyzenhaus-PSIRT-Feb-2018.pdf
Tyzenhaus-PSIRT-Feb-2018.pdf.md
Van-Horenbeeck-Maarten-Aiken-Klee_FIRST_20180626.pdf
Van-Horenbeeck-Maarten-Aiken-Klee_FIRST_20180626.pdf.md
Wataru-Matsuda-Mariko-Fujimoto-and-Takuho-Mitsunaga_FIRST_20180620.pdf
Wataru-Matsuda-Mariko-Fujimoto-and-Takuho-Mitsunaga_FIRST_20180620.pdf.md
Wilson-Doug_FIRST_20180629.pdf
Wilson-Doug_FIRST_20180629.pdf.md
AsianGames-first2019.pdf
AsianGames-first2019.pdf.md
Blue-team-vs.-Red-team-Tabletop-Exercise-to-Train-the-Process-of-Attack-Investigation.pdf
Blue-team-vs.-Red-team-Tabletop-Exercise-to-Train-the-Process-of-Attack-Investigation.pdf.md
FIRST-Annual-Report-2018-2019.pdf
FIRST-Annual-Report-2018-2019.pdf.md
FIRST2019_OptimizePrime.pdf
FIRST2019_OptimizePrime.pdf.md
Public-_Hunting-and-Automation-Using-Open-Source-Tools_FIRST.pdf
Public-_Hunting-and-Automation-Using-Open-Source-Tools_FIRST.pdf.md
Threat-Detection-based-on-Deep-Learning-at-Scale_PUBLIC_presentationFirst2019-upload.pdf
Threat-Detection-based-on-Deep-Learning-at-Scale_PUBLIC_presentationFirst2019-upload.pdf.md
Vetterl_fingerprinting-honeypots_FIRST-19.pdf
Vetterl_fingerprinting-honeypots_FIRST-19.pdf.md
How Cybercrime Bypasses common security controls in the enterprises.pptx
poc链接的反分析.pptx
基于深度学习进行数据防伪.pptx
数字化时代 安全新生态.pdf
数字化时代 安全新生态.pdf.md
春天还是秋天?安全创业走向何方.pptx
特斯拉汽车网关的逆向揭秘.pptx
突破物理隔离的窃密方式.pptx
终端安全和威胁情报的双重变奏.pptx
网络欺骗:防御者的诡计.pdf
网络欺骗:防御者的诡计.pdf.md
认知时代的安全体系.pdf
认知时代的安全体系.pdf.md
金融科技企业信息安全风控实践分享.pptx
A Meaningful Metric for IPv4 Addresses.pdf
A Meaningful Metric for IPv4 Addresses.pdf.md
Better Reporting Guidelines for Better Data.pdf
Better Reporting Guidelines for Better Data.pdf.md
Capturing and Processing One Million Network Flows Per Second with SiLK Challenges and Strategies.pdf
Capturing and Processing One Million Network Flows Per Second with SiLK Challenges and Strategies.pdf.md
Classifying Encrypted Traffic with TLS-Aware Telemetry.pdf
Classifying Encrypted Traffic with TLS-Aware Telemetry.pdf.md
Command and Control Mechanism Trends in Exploit Kits, RATs, APTs, and Other Malware.pdf
Command and Control Mechanism Trends in Exploit Kits, RATs, APTs, and Other Malware.pdf.md
Data Fusion Enhancing NetFlow Graph Analytics.pdf
Data Fusion Enhancing NetFlow Graph Analytics.pdf.md
Detecting Traffic to Recently Unparked Domains with Analysis Pipeline.pdf
Detecting Traffic to Recently Unparked Domains with Analysis Pipeline.pdf.md
Distributed Sensor Data Contextualization at Scale for Threat Intelligence Analysis.pdf
Distributed Sensor Data Contextualization at Scale for Threat Intelligence Analysis.pdf.md
Gosh Wow, Volusia Networks!.pdf
Gosh Wow, Volusia Networks!.pdf.md
Graph Analysis Techniques for Network Flow Records Using Open Cyber Ontology Group (OCOG) Format.pdf
Graph Analysis Techniques for Network Flow Records Using Open Cyber Ontology Group (OCOG) Format.pdf.md
Intelligence Driven Malware Analysis (IDMA) Malicious Profiling.pdf
Intelligence Driven Malware Analysis (IDMA) Malicious Profiling.pdf.md
Keynote Achieving a Secure and Resilient Cyber Ecosystem A Way Ahead.pdf
Keynote Achieving a Secure and Resilient Cyber Ecosystem A Way Ahead.pdf.md
Making the Most of a Lot [of Data] Netflow in US-CERT Operations.pdf
Making the Most of a Lot [of Data] Netflow in US-CERT Operations.pdf.md
Merging Network Configuration and Network Traffic Data in ISP-Level Analyses.pdf
Merging Network Configuration and Network Traffic Data in ISP-Level Analyses.pdf.md
Minimizing the Gaps with Bro, GRR, and Elk (Brogrrelk).pdf
Minimizing the Gaps with Bro, GRR, and Elk (Brogrrelk).pdf.md
Monitoring and Classification of Active IPv6 Addresses.pdf
Monitoring and Classification of Active IPv6 Addresses.pdf.md
Netflow Analysis - Intrusion Detection, Protection, and Usage Reporting.pdf
Netflow Analysis - Intrusion Detection, Protection, and Usage Reporting.pdf.md
Netflow in Daily Information Security Operations.pdf
Netflow in Daily Information Security Operations.pdf.md
Network Monitoring and Deceptive Defenses.pdf
Network Monitoring and Deceptive Defenses.pdf.md
Network Security Analytics, HPC Platforms, Hadoop, and Graphs.. Oh, My.pdf
Network Security Analytics, HPC Platforms, Hadoop, and Graphs.. Oh, My.pdf.md
Network Traffic Analysis - SiLK.pdf
Network Traffic Analysis - SiLK.pdf.md
New DNS Traffic Analysis Techniques to Identify Global Internet Threats.pdf
New DNS Traffic Analysis Techniques to Identify Global Internet Threats.pdf.md
Planning Curricula for the Network Traffic Analyst of 2018-2020.pdf
Planning Curricula for the Network Traffic Analyst of 2018-2020.pdf.md
Role Model Transformations for Flow Analysis in Cyberdefense.pdf
Role Model Transformations for Flow Analysis in Cyberdefense.pdf.md
Situational Awareness Threat Report (SATR).pdf
Situational Awareness Threat Report (SATR).pdf.md
Sources and Applications of Performance and Security-Augmented Flow Data.pdf
Sources and Applications of Performance and Security-Augmented Flow Data.pdf.md
Suricata Tutorial.pdf
Suricata Tutorial.pdf.md
The Security Wolf of Wall Street Fighting Crime with High-Frequency Classification and Natural Language Processing.pdf
The Security Wolf of Wall Street Fighting Crime with High-Frequency Classification and Natural Language Processing.pdf.md
Towards 100 Gbit Flow-Based Network Monitoring.pdf
Towards 100 Gbit Flow-Based Network Monitoring.pdf.md
Understanding Network Traffic Through Intraflow Data.pdf
Understanding Network Traffic Through Intraflow Data.pdf.md
Using Domain Name Registrant Information to Identify Malicious Domains.pdf
Using Domain Name Registrant Information to Identify Malicious Domains.pdf.md
1. AFast_FloCon_2018-4.pdf
1. AFast_FloCon_2018-4.pdf.md
1. Anomaly_detection_bpn_Flocon_2018_cp.pptx
1. Big Data Platform_ Lessons Learned.pptx
1. Palladino_FloCon_2018-01-09.pdf
1. Palladino_FloCon_2018-01-09.pdf.md
1. flocon_lateral_movement.pptx
2. FloCon 2018_.pdf
2. FloCon 2018_.pdf.md
2. FloCon-2018-McManus.pptx
2. Flocon_2018_Thomas_Dhia_Jan_10.pdf
2. Flocon_2018_Thomas_Dhia_Jan_10.pdf.md
2. InSight2 Final.pdf
2. InSight2 Final.pdf.md
3. Creating Sharing Value with Network Activity and Threat Correlation (002).pptx
3. DNS_analysis_onEdge_inMotion_flocon18_stringer.pptx
3. FloCon talk (Steven Noel MITRE).pdf
3. FloCon talk (Steven Noel MITRE).pdf.md
3. Flocon 2k18 - Network Data Exfiltration Techniques-almost-final-version.pdf
3. Flocon 2k18 - Network Data Exfiltration Techniques-almost-final-version.pdf.md
4. Heath-Harley BPFloCon.pptx
4. Reservoir FloCon-18 - 11JAN18.pdf
4. Reservoir FloCon-18 - 11JAN18.pdf.md
FloCon Poster Session.pdf
FloCon Poster Session.pdf.md
Saudi Aramco - FloCon 2018 - 9 Jan 2018.pdf
Saudi Aramco - FloCon 2018 - 9 Jan 2018.pdf.md
1. Cybersecurity Data Science - Best Practices from the Field.pptx
1. Detecting Automatic Flows.ppt
1. Detecting Lateral Movement with a Compute-intense Graph Kernel.pptx
1. Dynamically Repurposed and Programmable Network Monitoring.pdf
1. Dynamically Repurposed and Programmable Network Monitoring.pdf.md
1. Monitoring Massive Network Traffice.pdf
1. Monitoring Massive Network Traffice.pdf.md
1. Network Telescopes Revisited - From Loads of Unwanted Traffic to Threat Intelligence.pdf
1. Network Telescopes Revisited - From Loads of Unwanted Traffic to Threat Intelligence.pdf.md
2. Arbitrary Albatross-Neutral Naming of Vulnerabilities at Scale.pptx
2. Backwaters - Security Streaming Platform.pdf
2. Backwaters - Security Streaming Platform.pdf.md
2. Four Machine Learning Techniques that Tackle Scale.pdf
2. Four Machine Learning Techniques that Tackle Scale.pdf.md
2. Improved Hunt Seeding with Specific Anomaly Scoring.pdf
2. Improved Hunt Seeding with Specific Anomaly Scoring.pdf.md
2. InSight2.pdf
2. InSight2.pdf.md
2. Time-based Correlation of Malicious Event and their Connections.pdf
2. Time-based Correlation of Malicious Event and their Connections.pdf.md
3. Automated Cluster Testing and Optimization.pptx
3. IMPACT.pptx
3. Quantum Approach to Inverse Malware Eradication.pptx
3. The Power of Cyber Threat Intelligence and its Influence on Executive Decision Making.pptx
3. Using Generative Adversarial Networks to Harden Phishing Classifiers.PPTX
3. Using Triangulation to Evaluate Machine Learning Models (post).pdf
3. Using Triangulation to Evaluate Machine Learning Models (post).pdf.md
4. Harvesting Logs for Enhanced Investigations (post).pptx
4. The Generation and Use of TLS Fingerprints.pptx
FloCon 2019 - Analysis Workshop.pptx
FloCon 2019 - RulesOfTheGame.pdf
FloCon 2019 - RulesOfTheGame.pdf.md
FloconJupyter.zip
Graph Measures for Network Traffic Analysis.pdf
Graph Measures for Network Traffic Analysis.pdf.md
10. jspring_flocon_attck.pdf
10. jspring_flocon_attck.pdf.md
14. Burton Presentation.pdf
14. Burton Presentation.pdf.md
15. Malware's Abuse of Privacy.pdf
15. Malware's Abuse of Privacy.pdf.md
16. Code Similarity.pdf
16. Code Similarity.pdf.md
20. Reservoir FloCon-20.pdf
20. Reservoir FloCon-20.pdf.md
22. Mongeau_Cybersecurity Data Science 2020 Practitioner Perspectives and Guidance.pdf
22. Mongeau_Cybersecurity Data Science 2020 Practitioner Perspectives and Guidance.pdf.md
3. mcgrew-bayes-at-10gbps.pdf
3. mcgrew-bayes-at-10gbps.pdf.md
7. Long and Winding Road.pdf
7. Long and Winding Road.pdf.md
9. FloCon 2020 FINAL - Anthony Kasza.pdf
9. FloCon 2020 FINAL - Anthony Kasza.pdf.md
Caldejon intel-pcap-dragonfly-flocon.pdf
Caldejon intel-pcap-dragonfly-flocon.pdf.md
Gabriel-Cheng Comcast Security.pdf
Gabriel-Cheng Comcast Security.pdf.md
Harush_ML for a phishing incident response.pdf
Harush_ML for a phishing incident response.pdf.md
Hu, Bo Alchemy.pdf
Hu, Bo Alchemy.pdf.md
Kodituwakku_Thamavong_ Deep Learning for Compromised Hosts Detection.pdf
Kodituwakku_Thamavong_ Deep Learning for Compromised Hosts Detection.pdf.md
LSylvester_Mobile Presentation.pdf
LSylvester_Mobile Presentation.pdf.md
Lyles_Countermeasures.pdf
Lyles_Countermeasures.pdf.md
Mikhail_Werner_DEOFRAMEWORK.pdf
Mikhail_Werner_DEOFRAMEWORK.pdf.md
Pons_FloCon_20.pdf
Pons_FloCon_20.pdf.md
Rodgers_Required Elements.pdf
Rodgers_Required Elements.pdf.md
Shimeall-AnalyticTestQual.pdf
Shimeall-AnalyticTestQual.pdf.md
Shimeall-Data Driven Challenges.pdf
Shimeall-Data Driven Challenges.pdf.md
SysFlow Araujo; Taylor.pdf
SysFlow Araujo; Taylor.pdf.md
D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf
D1 KEYNOTE - Edward Schwartz - Embracing the Uncertainty of Advanced Attacks with Big Data Analytics.pdf.md
D1LAB - Didier Stevens - Windows x64 Essentials.pdf
D1LAB - Didier Stevens - Windows x64 Essentials.pdf.md
D1LAB - Itzik Kotler - Hack Like It's 2013.pdf
D1LAB - Itzik Kotler - Hack Like It's 2013.pdf.md
D1LAB - Vladimir Kropotov and Sergey Soldatov - Defending the Enterprise the Russian Way.pdf
D1LAB - Vladimir Kropotov and Sergey Soldatov - Defending the Enterprise the Russian Way.pdf.md
D1T1 - Hugo Teso - Aircraft Hacking - Practical Aero Series.pdf
D1T1 - Hugo Teso - Aircraft Hacking - Practical Aero Series.pdf.md
D1T1 - Peleus Uhley and Karthik Raman - Security Response in the Age of Mass Customized Attacks.pdf
D1T1 - Peleus Uhley and Karthik Raman - Security Response in the Age of Mass Customized Attacks.pdf.md
D1T1 - Petko D Petkov - Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools.pdf
D1T1 - Petko D Petkov - Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools.pdf.md
D1T1 - Sergey Bratus and Julian Bangert - Better Security Through Creative x86 Trapping.pdf
D1T1 - Sergey Bratus and Julian Bangert - Better Security Through Creative x86 Trapping.pdf.md
D1T1 - Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.pdf
D1T1 - Travis Goodspeed - Nifty Tricks and Sage Advice for Shellcode on Embedded Systems.pdf.md
D1T1 - Vladimir Vorontsov and Alexander Golovko - SSRF PWNs - New Techniques and Stories.pdf
D1T1 - Vladimir Vorontsov and Alexander Golovko - SSRF PWNs - New Techniques and Stories.pdf.md
D1T2 - Daniel Mende - Paparazzi Over IP.pdf
D1T2 - Daniel Mende - Paparazzi Over IP.pdf.md
D1T2 - Nicolas Seriot - Abusing Twitters API and OAuth Implementation.pdf
D1T2 - Nicolas Seriot - Abusing Twitters API and OAuth Implementation.pdf.md
D1T2 - Nikita Tarakanov - Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel.zip
D1T2 - Philippe Langlois - Hacking HLR HSS and MME Core Network Elements.pdf
D1T2 - Philippe Langlois - Hacking HLR HSS and MME Core Network Elements.pdf.md
D1T2 - Tal Zeltzer - Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance.pdf
D1T2 - Tal Zeltzer - Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance.pdf.md
D1T2 - Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.pdf
D1T2 - Wilco Baan Hofman - Bringing Dutch Alarm Systems to Their Knees.pdf.md
D2 KEYNOTE - Bob Lord - Rethinking the Front Lines.pdf
D2 KEYNOTE - Bob Lord - Rethinking the Front Lines.pdf.md
D2T1 - Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.pdf
D2T1 - Andrey Labunets and Egor Homakov - OAuth 2.0 and the Road to XSS.pdf.md
首页
上页
16
下页
共31页
FeeiCN/Security-PPT
各安全大会、安全沙龙的演讲内容,安全白皮书、安全研究报告、安全免费图书、安全指南等
GitHub下载
点赞
回复
回帖
支持markdown部分语法
?

[
文字
](
链接
)
```
多行代码
```
`
单行代码
`
**
加粗
**
*
斜体
*
###
标题
>
引用
1.
有序列表
-
无序列表
!-
单选投票选项
!--
多选投票选项
上传附件
提交
X