-
1
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector
Published 2016-03-01“…Le Journal de la Cybercriminalité & des Investigations Numériques…”
Get full text
Article -
2
Air-gap Limitations and Bypass Techniques: “Command and Control” using Smart Electromagnetic Interferences
Published 2016-01-01“…Le Journal de la Cybercriminalité & des Investigations Numériques…”
Get full text
Article -
3
The Missing Piece in Threat Intelligence
Published 2016-03-01“…Le Journal de la Cybercriminalité & des Investigations Numériques…”
Get full text
Article -
4
Malware Analysis Sandbox Testing Methodology
Published 2016-01-01“…Le Journal de la Cybercriminalité & des Investigations Numériques…”
Get full text
Article -
5
Malware Instrumentation Application to Regin Analysis
Published 2015-12-01“…Le Journal de la Cybercriminalité & des Investigations Numériques…”
Get full text
Article -
6
DGA Clustering and Analysis: Mastering Modern, Evolving Threats, DGALab
Published 2016-05-01“…Le Journal de la Cybercriminalité & des Investigations Numériques…”
Get full text
Article -
7
Make It Count: an Analysis of a Brute-forcing Botnet
Published 2016-02-01“…Le Journal de la Cybercriminalité & des Investigations Numériques…”
Get full text
Article