CANtact: Open Source Automotive Tools
The Emerging Era of Cognitive Security
The State of SCADA on the Internet
Jihadism and Cryptography, from internet to softwares
EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events
Control system security, are we living on luck?
Lessons from the Attack Chain: Bolster Your IR Program
RTF Abuse: Exploitation, Evasion and Counter Measures
Hiding in Plain Sight – Taking Control of Windows Patches