|2021-09-01 ⋅ YouTube (Black Hat) ⋅ |
How Did the Adversaries Abusing the Bitcoin Blockchain Evade Our Takeover?
|2021-05-06 ⋅ Black Hat ⋅ |
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover
|2020-07-14 ⋅ International Journal of Intelligence and Counter Intelligence ⋅ |
Cyber Threat Intelligence: A Product Without aProcess?