Title |
Conference |
Tags |
Keynote: The Past, Present, and Future of DNS Resolution |
Elbsides-2019 - Hamburg, Germany |
|
Privacy Preservation in DNS Analytics |
KasperskySASCancun-2018 - Cancun, Mexico |
|
Privacy Preservation in DNS Analytics |
KasperskySASCancun-2018 - Cancun, Mexico |
|
WANNACRY: WHAT CAN WE DO BETTER? |
First-2017 - san juan, puerto rico |
|
Scaling properties of software and system security |
SASkaspersky-2017 - st martin,saint marten |
|
Fighting The Insider Threat: Plugging The Leak In The Digital Fence |
InsiderThreat-2017 - monterey,california |
|
Scaling Properties of Distributed System Security |
Rootedcon-2017 - madrid,spain |
|
Scaling Properties of Software and System Security |
BSidesRaleigh-2016 - raleigh,usa |
|
Frontrunning the Frontrunners |
Defcon-2016 - las vegas,usa |
|
DIY Threat Intelligence with Real-Time Data |
FIRST-2016 - Seoul,South Korea |
|
DNS as a Defense VectorTech |
phdays-2016 - moscow,russia |
|
MULTIVARIATE SOLUTIONS TO EMERGING PASSIVE DNS CHALLENGES |
BlackHatAsia-2016 - marina bay,singapore |
|
NEW (AND NEWLY-CHANGED) FULLY QUALIFIED DOMAIN NAMES: A VIEW OF WORLDWIDE CHANGES TO THE INTERNETS DNS |
BlackHatEU-2015 - amsterdam,netherlands |
|
DNS AS A DEFENSE VECTOR |
Ruxcon-2015 - melbourne,austrailia |
|
TARGETED TAKEDOWNS: MINIMIZING COLLATERAL DAMAGE USING PASSIVE DNS |
BlackhatUS-2015 - Las vegas,usa |
|
Waterfall Computing – Creating Value in the Absence of Big Data |
CopenhagenCybercrimeConfrence-2015 - Copenhagen,Amsterdam |
|
Domain Name Abuse: How Cheap New Domain Names Fuel the eCrime Economy |
RSAus-2015 - San Francisco,USA |
|
Keynote |
nullcon-2015 - goa,india |
|
Domain Name Problems and Solutions |
defcon-2014 - las vegas,usa |
|
ABUSE OF CPE DEVICES AND RECOMMENDED FIXES |
BlackHatUS-2014 - las vegas,usa |
|
Human Intelligence Sharing for Collaborative Defense -- Op Sec TrustReturn to TOC |
FIRST-2014 - Boston,USA |
|
Use of Passive DNS Databases in Incident Response and ForensicsReturn to TOC |
FIRST-2014 - Boston,USA |
|
Keynote: Passive DNS Collection and Analysis—The "dnstap" Approach, |
Flocon-2014 - Albuquerque,USA |
|
Keynote: Economic Products and By-products of Open, Shared, Real Time Sinkholes--Lessons From GhostClick and Conficker |
FIRST-2013 - Bankgkok,Thailand |
Security
|
Silo Bus4ng in Informa4on Security: The ISC SIE Approach |
HITBSecConf Malaysia-2012 - KL, Malaysia |
Security
|
The DCWG Debriefing How the FBI Grabbed a Bot and Saved the Internet |
DEF CON-20 - Las Vegas, USA |
|
Keynote - Stories and Lessons from DNS Changer |
AusCERT-2012 - Gold Coast, Austrailia |
Security
|
Rule of Law in Cyber Conflict & Cybercrime |
GovSecInfo-2012 - Washington DC, USA |
|
Building DNS Firewalls with RPZ |
Baythreat-2011 - San Francisco, USA |
Security
|
Sie Passive Dns And The Isc Dns Database |
DEF CON-18 - Las Vegas, USA |
Security
DNS
|
Sie Passive Dns And The Isc Dns Database |
Blackhat USA-2010 - Las Vegas, USA |
Security
DNS
|
Internet Special Ops: Stalking Badness Through Data Mining |
Blackhat USA-2009 - Las Vegas, USA |
Security
|
Setting Dns'S Hair On Fire |
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
|
Panel: Internet Wars 2007 |
DEF CON-15 - Las Vegas, USA |
Security
|
Panel: Internet Wars 2006 |
DEF CON-14 - Las Vegas, USA |
Security
|
Malware Repository Requirements |
DEF CON-14 - Las Vegas, USA |
Security
Malware
|
The Internet'S March Of Folly: How, From Arpa To Wsis, Internet Governance Has Consistently Pursued Policies Contrary To Its Self Interest |
DEF CON-13 - Las Vegas, USA |
Security
|
Internet Survivability, Threats And Efforts |
DEF CON-13 - Las Vegas, USA |
Security
|
Preventing Child Neglect In Dnssec-Bis Using Lookaside Validation |
Blackhat USA-2005 - Las Vegas, USA |
Security
|
Preventing Child Neglect in DNSSEC-bis using Lookaside Validation |
BlackHatUSA-2005 - Las Vegas,USA |
|
Dns And Bind Security Issues |
5th USENIX UNIX Security Symposium-1995 - Salt Lake City, USA |
Security
DNS
|