×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of elie-bursztein
I am a legend: Hacking Hearthstone with machine learning - Defcon 22 talk slides
4.528 views
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google
83 views
The End is Nigh: Generic Solving of Text-based CAPTCHAs
253 views
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild
183 views
Dialing Back Abuse on Phone Verified Accounts - CCS 2014
187 views
Bad memories - Blackhat & Defcon 2010
506 views
Targeted Attacks Against Corporate Inboxes - a Gmail Perspective RSA 2017
8.399 views
Cloak of Visibility: Detecting When Machines Browse A Different Web - IEEE Security and Privacy 2016
213 views
Lessons learned while protecting Gmail
5.296 views
Investigating commercial pay-per-install and the distribution of unwanted software
296 views
Does dropping usb drives really work? Blackhat USA 2016
19.171 views
Neither snow nor rain nor mitm... an empirical analysis of email delivery security slides imc 15
1.613 views
Lessons learned while protecting Gmail
5.649 views
Cheating at poker James Bond Style
4.620 views
Cheating at poker James Bond Style
4.611 views
I am a legend: Hacking Hearthstone with machine learning - Defcon 22 talk slides
9.180 views