Papers / Feb, 2021

Bug Bounty Program of Last Resort

Read more about this entry
Papers / Nov, 2020

Cyber Resilience in the Electricity Ecosystem

Read more about this entry
Papers / Sep, 2019

Analysis and measures to secure the digital supply chain

Read more about this entry
Papers / Apr, 2017

Data Breaches & Bug Bounties

Read more about this entry
Papers / Sep, 2015

Current Threat Status and its Development

Read more about this entry
Papers / Aug, 2014

Cyber Crime Threat Intelligence - Turkey

Read more about this entry
Papers / Mar, 2014

Why Your Data Breach is My Problem

Read more about this entry
Papers / Dec, 2013

International Vulnerability Purchase Program (IVPP)

Read more about this entry
Papers / Dec, 2013

The Known Unknowns in Cyber Security

Read more about this entry
Papers / May, 2013

Cyber Kill Chain vs. Defense Effectiveness

Read more about this entry
Papers / May, 2013

Correlation Of Detection Failures

Read more about this entry
Papers / Feb, 2013

Vulnerability Threat Trends 2012

Read more about this entry
Papers / Dec, 2012

Modeling Exploit Evasions in Layered Security

Read more about this entry
Papers / Feb, 2012

Secunia Yearly Report 2011

Read more about this entry
Papers / Jun, 2011

How to Secure a Moving Target with Limited Resources

Read more about this entry
Papers / Apr, 2011

Cybercriminals do not need administrative users

Read more about this entry
Papers / Dec, 2010

Familiarity Breeds Contempt

Read more about this entry
Papers / Mar, 2010

The Security Exposure Of Software Portfolios

Read more about this entry
Papers / Mar, 2010

Quantification of deviations from rationality with heavy-tails in human dynamics

Read more about this entry
Papers / Jun, 2009

Modelling the Security Ecosystem

Read more about this entry
Papers / May, 2009

Why Silent Updates Boost Security

Read more about this entry
Papers / Jan, 2009

Firefox (In)Security Update Dynamics Exposed

Read more about this entry
Papers / Jan, 2009

Security Econometrics - The Dynamics of (In)Security

Read more about this entry
Papers / Aug, 2008

Understanding The Web Browser Threat

Read more about this entry
Papers / Jul, 2008

Putting Private And Government CERT's To The Test

Read more about this entry
Papers / Mar, 2008

Exposing Vendors (In)security Performance (0-Day Patch)

Read more about this entry
Papers / Sep, 2006

Large-Scale Vulnerability Analysis

Read more about this entry
Papers / Jun, 2006

Technology Speed of Civil Jet Engines

Read more about this entry
Papers / Apr, 2004

DDoS Attacks through Non Delivery Messages

Read more about this entry