Posts

Showing posts from 2015

Security Log Analysis And Machine Learning On Hadoop(Part 1 - Ingestion)

Reverse Engineering Closed Source Android Apps Part 1(Smali Intro)