NCC Group Research Blog
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 4: Architecture and Design
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 5: Development of Prototype #1 – Text Processing and Semantic Relationships
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 10: Efficacy Demonstration, Project Conclusion and Next Steps
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 2: Going off on a Tangent – AI/ML Applications in Social Engineering
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 3: Understanding Existing Approaches and Attempts
7 months 3 weeks ago
Professional C Programming LiveLessons, (Video Training) Part I: Writing Robust, Secure, Reliable Code
7 months 3 weeks ago
Project Ava: On the Matter of Using Machine Learning for Web Application Security Testing – Part 1: Understanding the Basics and What Platforms and Frameworks Are Available
7 months 3 weeks ago
Preparing for Cyber Battleships – Electronic Chart Display and Information System Security
7 months 3 weeks ago
Principal Mapper (pmapper)
7 months 3 weeks ago
Private sector cyber resilience and the role of data diodes
7 months 3 weeks ago
Premium Security Content Gateway
7 months 3 weeks ago
Premium Practical Law Content Gateway
7 months 3 weeks ago
Premium Practical Law Content Gateway(2)
7 months 3 weeks ago
Practical Machine Learning for Random (Filename) Detection
7 months 3 weeks ago
Practical SME security on a shoestring
7 months 3 weeks ago
Premium Content Gateway
7 months 3 weeks ago
Potential false redirection of web site content in Internet in SAP NetWeaver web applications
7 months 3 weeks ago
Practical Considerations of Right-to-Repair Legislation
7 months 3 weeks ago
Porting the Misfortune Cookie Exploit: A Look into Router Exploitation Using the TD-8817
7 months 3 weeks ago
Checked
18 minutes 52 seconds ago