Posted on 02/20/201312/05/2013 PART 2 “The Attack” – THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target
Posted on 02/11/201312/05/2013 THE SOCIAL MEDIA DECEPTION PROJECT : How We Created Emily Williams To Compromise Our Target
Posted on 12/18/201212/06/2013 Beating Signature Based Security – Dynamic Software That Obfuscates Malware
Posted on 10/29/201207/11/2016 Defending Against The Next Generation Distributed Denial of Service DDoS Attacks : DDoS Defense Reference Architecture