This is the second part of a two-part blog based on my paper for AVAR 2012 that discusses the complications […]

Dhanalakshmi
February 2, 2013
This is the second part of a two-part blog based on my paper for AVAR 2012 that discusses the complications […]
Over the New Year period 0-day exploits have been rampaging around. In our threat control lab we have looked into […]
This is the first part of a two-part blog based on my paper for AVAR 2012 that discusses the complications in automating […]