Publication content 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 8 article(s) - 2014 The attack against Sony Pictures Entertainment December 7, 2014 Voir l’article Report for the SSTIC 2014 conference (Part 2 of 2) July 7, 2014 Voir l’article Report for the SSTIC 2014 conference (Part 1 of 2) June 7, 2014 Voir l’article Entropy generation on Linux virtual machines May 7, 2014 Voir l’article Attackers’ profiles and motivations April 6, 2014 Voir l’article JSSI 2014 conference report March 6, 2014 Voir l’article Report on the security conference INSA-2014 January 27, 2014 Voir l’article The decentralized Bitcoin currency and its security January 7, 2014 Voir l’article
Publication content 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 8 article(s) - 2014 The attack against Sony Pictures Entertainment December 7, 2014 Voir l’article Report for the SSTIC 2014 conference (Part 2 of 2) July 7, 2014 Voir l’article Report for the SSTIC 2014 conference (Part 1 of 2) June 7, 2014 Voir l’article Entropy generation on Linux virtual machines May 7, 2014 Voir l’article Attackers’ profiles and motivations April 6, 2014 Voir l’article JSSI 2014 conference report March 6, 2014 Voir l’article Report on the security conference INSA-2014 January 27, 2014 Voir l’article The decentralized Bitcoin currency and its security January 7, 2014 Voir l’article