Tom ( Decius ) Cross [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Do Export Controls on “Intrusion Software” Threaten Vulnerability Research? Defcon-2015 - Las vegas,usa
PEN TESTING A CITY BlackhatUS-2015 - Las vegas,usa
The Library of Sparta: Applying Military Doctrine to Cybersecurity RSAus-2015 - San Francisco,USA
Deception for the Cyber Defender: To Err is Human; to Deceive, Divine Shmoocon-2015 - washington,usa
THE LIBRARY OF SPARTA BlackHatUS-2014 - las vegas,usa
Intelligent Cyber Security for the Real World CyCon-2014 - Tallinn, Estonia
Key Terrain in Cyberspace: Seeking the High Ground CyCon-2014 - Tallinn, Estonia
A Framework for Control Measures to Limit Collateral Damage and Propagation of Malicious Software CyCON-2013 - Tallinn, Estonia
Insider Threat: Hunting for Authorized Evil SourceBoston-2013 - Boston,USA Security
Detecting Insider Threats with Netflow FloCon-2013 - Albuquerque, USA Security
Why I Am Pessimistic About The Future PhreakNIC-2012 - Murfreesboro,USA Security
Fixing Wifi Security Once And For All PhreakNic15-2011 - USA Security
Drunken Rant PhreakNic15-2011 - USA Security
Exploiting Internet Surveillance Systems DEF CON-18 - Las Vegas, USA Security
Unauthorized Internet Wiretapping: Exploiting Lawful Intercept Blackhat USA-2010 - Las Vegas, USA Security Access
Exploiting Lawful Intercept to Wiretap the Internet BlackHatDC-2010 - Washington, USA
Warrantless Laptop Searches At U.S. Borders The Last HOPE-2008 - USA Security Privacy Legal