Search for "C B" returned 9732 results
40 min
Privacy Invasion or Innovative Science?
Academia, social media data, and privacy
56 min
Effective Denial of Service attacks against web application platforms
We are the 99% (CPU usage)
62 min
Post Memory Corruption Memory Analysis
Automating exploitation of invalid memory writes
116 min
Hacker Jeopardy
Number guessing for geeks
53 min
Building a Distributed Satellite Ground Station Network - A Call To Arms
Hackers need satellites. Hackers need internet over…
57 min
Hacking MFPs
Part2 - PostScript: Um, you've been hacked
45 min
Crowdsourcing Genome Wide Association Studies
Freeing Genetic Data from Corporate Vaults
62 min
Bionic Ears
Introduction into State-of-the-Art Hearing Aid Technology
26 min
Don't scan, just ask
A new approach of identifying vulnerable web applications
61 min
Time is on my Side
Exploiting Timing Side Channel Vulnerabilities on the Web
26 min
Data Mining the Israeli Census
Insights into a publicly available registry
57 min
7 years, 400+ podcasts, and a whole lot of Frequent Flyer Miles
Lessons learned from producing a weekly independent podcast…
54 min
Datamining for Hackers
Encrypted Traffic Mining
62 min
Automatic Algorithm Invention with a GPU
Hell Yeah, it's rocket science
54 min
The coming war on general computation
The copyright war was just the beginning
49 min
Does Hacktivism Matter?
How the Btx hack changed computer law-making in Germany
60 min
What is WhiteIT and what does it aim for?
Why you probably want to be concerned about it and similiar…
62 min
The movements against state-controlled Internet in Turkey
A short account of its history and future challenges
57 min
802.11 Packets in Packets
A Standard-Compliant Exploit of Layer 1
64 min