Bootstrapping A Security Research Project
The Topology of Malicious Activity in IPv4
Mr. Human - Vulnerability Management from the Attacker’s Perspective
Social Media Risk Metrics
Key Attribute Risk Management and Analysis (KARMA)