Reference Library
26.5K subscribers
1K photos
122 videos
343K files
10.3K links
کتابخانه مرجع
مرجع تخصصی کتاب

لینک چنل آرشیو کتب:
@BOOKzMA
Download Telegram
junos_ddos_guide.pdf
1.8 MB
#hardening
#Whitepaper
"Junos OS Attack Detection and Prevention User Guide for Security Devices", 2021.
RevEAL.pdf
669 KB
#Research
#cryptography
"RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library", 2022.
MS Word Forensic Locations.pdf
1.2 MB
#Forensics
MS Word Forensic Locations
Rep_2H_2021.pdf
1.6 MB
#Analytics
#SCADA_Security
"Claroty Biannual ICS Risk & VulnerabilityULNERABILITY
Report": 2H 2021.
examining_cve_2020_0601_crypt32dll.pdf
7 MB
#Research
#cryptography
Examining CVE-2020-0601 Crypt32.dll Elliptic Curve Cryptography (ECC) Certificate Validation Vulnerability
Alexa_versus_Alexa.pdf
1.2 MB
#WLAN_Security
"Alexa versus Alexa:
Controlling Smart Speakers by Self-Issuing Voice Commands", 2022.
Security_Analysis_MTE.pdf
2.6 MB
#Research
"Security Analysis of MTE
Through Examples", 2021.
imessage_exploitation.pdf
1.6 MB
"A Brief History of iMessage Exploitation", 2022.
TextAttack.pdf
965.2 KB
#Research
"TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP", 2020.

]-> Repo: https://github.com/QData/deepWordBug
forensic_analysis_android_browsing_artifacts.pdf
4.1 MB
#Whitepaper
"A Forensic Analysis of Android Mobile Private Browsing Artifacts", 2022.
Automatically_Mitigating_Vulns_x86.pdf
1.2 MB
#Threat_Research
"Automatically Mitigating Vulnerabilities in x86 Binary Programs via Partially Recompilable Decompilation", 2022.
Jigsaw_Puzzle.pdf
406.6 KB
#Research
"Jigsaw Puzzle:
Selective Backdoor Attack to Subvert Malware Classifiers", 2022.
Computer_Networking_Principles_Protocols_and_Practice_1646180166.pdf
11.2 MB
#Network
Computer Networking : Principles, Protocols and Practice