Junghoon OH (AhnLab)
a-forensic-analysis-of-apt-lateral-movement-in-windows-environment.pptx
MD5: e51d7a2d9a009e9c260f4eabe0ad9d84
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 3.11 Mb
first_2014_-_oh-_junghoon_-_forensic_analysis_apt_lateral_movement_in_windows_environment.pptx
MD5: 6553ed61d5336cd666686f02140365d8
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.03 Mb
Art MANION (CERT Coordination Center)
first_2014_-_manion-_art_-_certcc.pdf
MD5: 90b1ee34554a994444935a9ea5fc6142
Format: application/pdf
Last Update: June 7th, 2024
Size: 6.73 Mb
Denise ANDERSON (Financial Services Information Sharing and Analysis Center (FS-ISAC)), George JOHNSON (NC4)
first_2014_-_anderson-_denise_-_speed_of_light_20140620.pptx
MD5: bc78cbada8d163cec7351e15fcd654ec
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 4.16 Mb
JaeByung YOON (KrCERT/CC)
first_2014_-_yoon-_jaebyung_-_attacks_using_malicious_hangul_20140608.pptx
MD5: 5851f29b96d0ebfb4da2d2e30812483e
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 4.77 Mb
Pawel PAWLINSKI (CERT Polska / NASK)
first_2014_-_pawlinski-_pawel_-_avoiding_information_overload_20140623.pdf
MD5: 1b957697c3adc83981178ae1525dc9a6
Format: application/pdf
Last Update: June 7th, 2024
Size: 585.19 Kb
Mikko KARIKYTö (Ericsson)
first_2014_-_karikyto_-mikko_-_back_to_the_roots__incident_case_study_20140619.pptx
MD5: 2f1d006369212b327680ae3d156ce7a8
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 5 Mb
Mr. Christian ROSSOW (Vrije Universiteit Amsterdam)
In amplification DDoS attacks, an adversary abuses the fact that public servers of UDP-based network protocols respond to requests without further validating the identity of the sender. In Feb 2014, attackers abused the NTP protocol to launch the largest-ever DDoS attack to-date (about 400 Gbps attack traffic volume). This talk describes amplification vulnerabilities in 14 network protocols. We raise a discussion of what can be done to counter such vulnerabilities.
MD5: e3f54ea0250ed69d9b2f78c3b3ce3516
Format: application/pdf
Last Update: June 7th, 2024
Size: 1012.7 Kb
Ben APRIL (Trend Micro)
first_2014_-_april-_ben_-_bitcoin_20140607.pdf
MD5: 801d52913567686d179612e3433e533c
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.56 Mb
Mr. David KVATADZE (LEPL Data Exchange Agency)
cert-gov-ge_services_first.pdf
MD5: 33bb3160e81c8f4eddc851dcf1d689d2
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.78 Mb
Seth HANFORD (Cisco Systems, Inc.)
first_2014_-_hanford-_seth_-_cvss_v3_20140605.pptx
MD5: a1c08e642f4c7d041b20743133b8f358
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 3.69 Mb
Dr. Mitsuaki AKIYAMA (NTT-CERT)
akiyama_mitsuaki-credential_honeytoken.pdf
MD5: 1f61ff66e3fc1788653459fd6ada31ab
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.56 Mb
Miroslaw MAJ (Cybersecurity Foundation)
first_2014_-_maj-_miroslaw_-_lessons_learnt_for_cert-s.pdf
MD5: e1e3022b96e190dc6cd1456562ff9390
Format: application/pdf
Last Update: June 7th, 2024
Size: 6.15 Mb
Peter O'DELL (Swan Island Networks)
first_2014_-_odell-_pete_-_cyber_security_20140529.pptx
MD5: 77d21b37f00c9e1646c35e9d2dceda8e
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 3.58 Mb
Andrea HENSON-ARMSTRONG (The Justice Management Institute)
first_2014_-_armstrong-_andrea_-_aha.cyberthreats.officials_20140623.pdf
MD5: b9e0304a94c79c61e4ee3802651d7c8c
Format: application/pdf
Last Update: June 7th, 2024
Size: 2.05 Mb
first_2014_-_henson-armstrong-_andrea_-_westlaw_doc_20140624.pdf
MD5: cf473836a4fd38c8ccaeaa1871b52a5e
Format: application/pdf
Last Update: June 7th, 2024
Size: 193.64 Kb
Ms. Margrete RAAUM (Statnett)
The energy facilities are increasingly being the target for attacks. With the nature of the systems and the criticality of the services, doing good incident response and having a trust network is becoming increasingly important. We will look at some incidents and some learning processes.
Margrete Raaum has worked on information security since 1998. She has worked for the Education sector, the ISP community as well the Norwegian Security Authority and National CERT, NSM/NorCERT. She now works for Statnett, the Norwegian Transmission System Operator, on risk assessment and incident response. She is elected member of the board of directors of FIRST leading the work in the energy sector working group.
MD5: 43228e3e4ad9ef15b647d389c1f862e3
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.33 Mb
Yurie ITO (JPCERT/CC)
first_2014_-_ito-_yurie_-_panel_20140622.pptx
MD5: 2607c7a949f51a507d2d26944b85373b
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 219.86 Kb
first_2014_-_ito-_yurie_-_panel_cyber_health_green_20140622.pptx
MD5: d3ecd6a733c375bbb8824a50f1b6dbe1
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 1.79 Mb
Kristy WESTPHAL (Element Payment Services)
first_2014_-_westphal-_kristy_-_don-t_panic_20140527.pptx
MD5: bcafd4f4ba86a4d0149e8f0cdb64b200
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 8.43 Mb
Chris STRASBURG (Ames Laboratory, US DOE), Andrew HOYING (National Renewable Energy Laboratory), Daniel HARKNESS (Argonne National Laboratory), Scott PINKERTON (Argonne National Laboratory)
first_2014_-_strasburg-_c_hoying-_a_harkness-_d_pinkerton-_s-_flexibletransform_20140630.pptx
MD5: 6a8a95afba6601e9626aa6d5e1fbba9c
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 4.74 Mb
MD5: 39f3d6db312f19f396e2f1cf692ef5e6
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 4.74 Mb
David BIANCO (Mandiant Corporation)
first_2014_-_bianco-_david_-_enterprise_security_monitoring_20140610.pdf
MD5: 106ea57f15f5b9832c3326ac2c6e0621
Format: application/pdf
Last Update: June 7th, 2024
Size: 2.68 Mb
John KRISTOFF (Team Cymru)
first_2014_-_kristoff-_john_-crypto_20140625.pdf
MD5: 32c865a67e7102559994e83a0c93cde4
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.49 Mb
MD5: 629beaff04df4ddb1c75c88021bbddad
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.5 Mb
Eric ZIELINSKI (Nationwide), Mick DOUGLAS (Nationwide)
first_2014_-_zielinski-_douglas_-_exfiltration_20140604.pptx
MD5: 8d6aea7d33718b5c8fd9b4f4474d6131
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.32 Mb
Hitoshi ENDOH (NTT-CERT)
first_2014_-_endoh-_hitoshi_-_building_cyber_threat_20140611.pdf
MD5: 0ddb3dda93ac9c58ef8ba86e265f6724
Format: application/pdf
Last Update: June 7th, 2024
Size: 2.48 Mb
first_2014_-_endoh-_hitoshi_-_building_cyber_threat_20140629.pdf
MD5: 6b0b97c800b5fbbec79d94028ad3d243
Format: application/pdf
Last Update: June 7th, 2024
Size: 802.35 Kb
Thomas MILLAR (US-CERT), Adam SHOSTACK (Microsoft TWC), Samuel PERL (Carnegie Mellon SEI CERT)
first_2014_-_perl-_saam_millar-_thomas_shostack-_adam_-_identifying_the_-root-__20140607.pptx
MD5: b7bb138aee06597d243287ded45ac816
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.68 Mb
Kauto HUOPIO (NCSC-FI)
first_2014_-_huopio-_kauto_-_your_assistance_is_required_20140613.pdf
MD5: 504da19d514b59039b988665cf8db723
Format: application/pdf
Last Update: June 7th, 2024
Size: 625.34 Kb
first_2014_-_huopio-_kauto_-_your_assistance_is_required_20140627.pdf
MD5: 4488675cfc673561fec265c33135d313
Format: application/pdf
Last Update: June 7th, 2024
Size: 455.79 Kb
Pascal ARENDS (Fox-IT)
first_2014_-_arends-_pascal_-_prs_20140626.pdf
MD5: 9c7896adfdba7bcb162e8d49b8ae88f6
Format: application/pdf
Last Update: June 7th, 2024
Size: 831.33 Kb
Dr. Olivier THONNARD (Symantec)
first_2014_-_thonnard-_olivier_-_targeted_attacks_20140630.pdf
MD5: 4e38e3447fba58674af023c55d049d36
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.64 Mb
Garrett SCHUBERT (EMC Corporation)
first_2014_-_schubert-_garrett_-_decrease_exposure_time-gs_20140627.pptx
MD5: 721367497418ef987a3d942b0598d192
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 8.25 Mb
Stephen SELJAN (General Dynamics Fidelis Cyber Security Solutions)
first_2014_-_seljan-_stephen_-_managed_security_service_provider_20140622.pptx
MD5: c8708c15e2a1c9fc96f293066a5748da
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 3.58 Mb
Juan Carlos MONTES (INTECO-CERT)
first_2014_-_montes-_juan_c._-_merovingio_20140624.pptx
MD5: c1b97b3abead0d844e502bd1dc0bb324
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 3.54 Mb
first_2014_-_montes-_juan_carlos_-_merovingio.pdf
MD5: 7ea7ec70e8e0d0a2fb2725909cb6c178
Format: application/pdf
Last Update: June 7th, 2024
Size: 789.54 Kb
Dr. Ching-Hao MAO (Institute for Information Industry)
first_2014_-_mao-_ching-hao_-__v2.0_20140625.pdf
MD5: 43dcfdcc415edaa79a73108ac7611519
Format: application/pdf
Last Update: June 7th, 2024
Size: 7.9 Mb
Aubrey MERCHANT-DEST (Blue Coat Systems, Inc.)
first_2014_-_merchant-dest-_aubrey_-_network_security_analytics_today_20140620.pptx
MD5: 596d54ca9d6feb59cb381a06bcac60a5
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 3.6 Mb
first_2014_-_merchant-dest-_aubrey_-_network_security_analytics_today_20140625.potx
MD5: 4e89063375711e7b3b746875e02b5b40
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 5.32 Mb
Takayuki UCHIYAMA (JPCERT Coordination Center), Hiroshi KOBAYASHI (JPCERT Coordination Center)
first_2014_-_uchiyama-takayuki_-_kobayashi-_hiroshi_-_dns_resolver_20140623.pdf
MD5: cd0df81628ffd8e6d7c54d764d94cfb3
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.26 Mb
Yoshiki SUGIURA (NTT-CERT), Keisuke KAMATA (Freelance)
first_2014_-_sugiura-_yoshiki_-_open_source_software_20140610.pptx
MD5: 86f980bfac32285bbaa9bb956b6ad0b2
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 9.6 Mb
Christopher HARRINGTON (EMC Corporation), Kathleen MORIARTY (EMC Corporation)
first_2014_-_moriarty-_kathleen_-_harrington-_christopher_-_ietf-mile_20140624.pptx
MD5: 687317ac5191fa1c5fd635a419c54265
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 537.72 Kb
Dr. Heiko PATZLAFF (Siemens)
first_2014_-_patzlaff-_heiko_-_siemens_20140623.pdf
MD5: 94fc0091cac937bc754a15e1564adb19
Format: application/pdf
Last Update: June 7th, 2024
Size: 2.32 Mb
Tim SLAYBAUGH (Northrop Grumman Corporation)
first_2014_-_slaybaugh-_tim_-_pass_the_hash_20140623.pptx
MD5: 469b438ff9ea6006ba4d667c7c37b449
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 6.33 Mb
Fernando KARL (Defenda), Felipe BOEIRA (Samsung)
first_2014_-_karl-_fernando_-_boeira-_felipe_-_pbot_an_overview_20140603.pptx
MD5: e6ef8fd260771d3f882c07892b7f9d6f
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.7 Mb
Cem GURKOK (Verizon Terremark)
first_2014_-_gurkok-_cem_-_rootkits_in_os_x_memory_20140603.pdf
MD5: bb7accd226a151186bbc383083fac4e2
Format: application/pdf
Last Update: June 7th, 2024
Size: 8.46 Mb
first_2014_-_gurkok-_cem_-_rootkits_in_os_x_memory_20140626.pdf
MD5: f8d49fc1377b4443c7c3a27cab408aac
Format: application/pdf
Last Update: June 7th, 2024
Size: 8.61 Mb
Konrads SMELKOVS (KPMG LLP)
first_2014_-_konrads_smelkovs_-_20140701.pptx
MD5: f24fbb4400a96c4e75aad71816a5dff6
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.33 Mb
2014_first_symposium_tbilisi.pdf
MD5: f10261311b30696429cb9d34d4d0690f
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.65 Mb
Chris HORSLEY (CSIRT Foundry), L. Aaron KAPLAN (CERT.at)
first_2014_-_kaplan-_aaron_-_ifas-ihap_20140625.ppt
MD5: 891135c70c7358bdd38219bda2d99e0d
Format: application/vnd.ms-powerpoint
Last Update: June 7th, 2024
Size: 4.96 Mb
Kouichi MIYASHITA (F.TRON Inc.), Mariko MIYA (CDI-CIRT (Cyber Defense Institute, Inc.) - Japan)
first_2014_-_miya-_mariko_-_protecting_the_computer_from_ring_0_20140623.pdf
MD5: f0f5d4bf0b3f457475604fcae965a9b2
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.31 Mb
MD5: 7cc29834996887856a7ca70d557d32d1
Format: application/pdf
Last Update: June 7th, 2024
Size: 19.11 Kb
Gonzalo ROMERO (.CO Internet)
first_2014_-_romero-_gonzalo_-_rogue-pharma_20140530.pdf
MD5: 6f3df186e4482605af1e28f1759966f8
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.29 Mb
Mr. Douglas WILSON (Mandiant)
first_2014_-_wilson-_doug_-_scaling_threat_intelligence_20140603.pptx
MD5: 1377bdf93c3e35ad50297a1c78938a3e
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.61 Mb
first_2014_-_wilson-_doug_-_scaling_threat_intelligence_20140627.pptx
MD5: b3137b04dd4295b4882be6adc88d59ee
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.61 Mb
Nikolay KOVAL (CERT-UA)
first_2014_-_koval-_nikolay_-_cert-ua_20140623_pdf.pdf
MD5: 479ddb70288e99989873a2eda8d8a733
Format: application/pdf
Last Update: June 7th, 2024
Size: 4.64 Mb
Christopher CLARK (Verisign)
first_2014_-_clark-_christopher_-_graphdb_20140528.pptx
MD5: a3eb95fa7209de0da495998956df7c2d
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 2.04 Mb
Ms. Inna KHOLODOVA
The increase of different types of malware and compromised hosts requires appropriate actions from network operators. Monitoring systems are necessary to identify such treats.
Shadowserver Foundation reporting service provides free-of-charge reports on malicious activity.
These reports are important to detect vulnerable hosts and mitigate further attacks such as DDoS, Botnet C&C, drones, clickfrauds, compromised systems all over the world.
CERT-AM is subscribed to Shadowserver reports and receives country level statistics on all collected data. The introduced software has been developed to distribute this important information to local ISP and operators.
MD5: a872eba3218e92953d416dd97b0a4d02
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.2 Mb
Mr. Andrzej DERESZOWSKI (SIGNAL 11)
The talk will be about an advanced cyber espionage tool used in targeted attacks across Europe. The information about the use of the tool has first hit the public beginning 2014 with a series of disclosures published by security companies and independent researchers. A lot of information has been published since. We will have a look through all this trying to make a bigger picture of Snake-related operations and developments.
The author is an independent security consultant working for big organizations across Europe. He specializes in malware analysis and APT hunting. In his spare time he is a security researcher and developer of malware analysis tools. He is an active member of the IT security community and promotes sharing of threat intelligence. He is also an occasional speaker at security conferences – he spoke at Black Hat, RECON, TechEd, NATO Cyber Defense Workshop and others.
turla-operations_and_development.pdf
MD5: e7177c9e12c511d93fd8b4a4cd8fdfed
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.77 Mb
Tomasz BUKOWSKI (CERT Polska/NASK)
first_2014_-_bukowski-_tomasz_-_sinkholing_20140620.pdf
MD5: d82de3e2722ec7dc2377bd794bcf9133
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.39 Mb
first_2014_tomasz_bukowski.pdf
MD5: ea1035728a0bad16c102d87a4578ec8a
Format: application/pdf
Last Update: June 7th, 2024
Size: 298.44 Kb
Tarik EL YASSEM (NCSC.NL)
first_2014_-_el_yassem-_tarik_-_dutch_responsible_disclosure_policy_20140620.pdf
MD5: b97d3ee27e449fe480cfdeb2a47e1232
Format: application/pdf
Last Update: June 7th, 2024
Size: 1.85 Mb
Martin LEE (CISCO)
Advances in integrated circuits mean that processors are becoming more powerful in terms of functionality, yet consuming less power, and becoming smaller in size. These features coupled with the ubiquity of internet connectivity means that all sorts of devices are being connected to the internet. The ability to remotely monitor and react to changing conditions may bring advantages in terms of reducing waste and increasing efficiency. But what are the implications from a security perspective?
Unpatched devices, running obsolete code, communicating with insecure protocols to lowest price remote facilities management centres enable many new and interesting means by which miscreants can attack organisations. In this session we shall discuss the implications of the “internet of everything” and how security professionals need to consider and manage the risks entailed.
MD5: f4eb5e39a9d359dd9af9ea2e9b82ee8b
Format: application/pdf
Last Update: June 7th, 2024
Size: 8.09 Mb
Dr. Bernd GROBAUER (Siemens), Thomas SCHRECK (Siemens), Dr. Jan GOEBEL (Siemens), Johann WALLINGER (Siemens), Stefan BERGER (Siemens)
first_2014_-_grobauer-_bernd_-_mantis_20140624.pdf
MD5: 1eddf9c808f9683505f95c60854d9296
Format: application/pdf
Last Update: June 7th, 2024
Size: 2.61 Mb
first_2014_-_grobauer-_bernd_-_mantis_framework_20140606.pdf
MD5: 3fcb4657a35cf4cd41f9635eb3a92ae3
Format: application/pdf
Last Update: June 7th, 2024
Size: 2.26 Mb
Johan BERGGREN (Google)
first_2014_-_berggren-_johan_-_transparency_info_sharing_dfir_20140610.pdf
MD5: 6d9f68198ca4f13eeb5966a90b3b3d29
Format: application/pdf
Last Update: June 7th, 2024
Size: 646.86 Kb
transparency_info_sharing_digital_forensics.pdf
MD5: 14679e23cfe11c3995552e6f5beb7f71
Format: application/pdf
Last Update: June 7th, 2024
Size: 870.97 Kb
Robin RUEFLE (CERT Program, SEI, CMU)
first_2014_-_ruefle-_robin-_multi-tiered_csirt_evaluation-v2_20140624.pptx
MD5: 50b3ed0f566fba1a98721eedece63855
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 564.84 Kb
Steve ZACCARO (George Mason University)
first_2014_-_zaccaro-_stephen_j._-_presentation_draft_-_v8_-_20140623.pptx
MD5: 6a0fa90b1a470c182fc0e756fc9f6a90
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 3.37 Mb
Dr. Paul VIXIE (Farsight Security, Inc)
first_2014_-_vixie-_paul_-_op_sec_trust.pdf
MD5: ea4fdde3770fad766ed4138acaa25ff6
Format: application/pdf
Last Update: June 7th, 2024
Size: 46.85 Kb
first_2014-_vixie-_paul_-_dns_as_a_forensics_tool.pdf
MD5: 057e13bd6dc287e08406bb132f9e355f
Format: application/pdf
Last Update: June 7th, 2024
Size: 788.61 Kb
Siva Raj RAJAGOPALAN (HONEYWELL), Xinming OU (Kansas State University)
first_2014_-_rajagopalan-_raj_-_anthropology-security_20140623.pptx
MD5: 1c767e6492e5feba1df88ba56ed38c30
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 7.71 Mb
first_2014_-_rajagopalan-_raj_-_anthropology-security_20140625.pptx
MD5: 493b2b238c90c9b11f62003758cb9c9e
Format: application/vnd.openxmlformats-officedocument.presentationml.presentation
Last Update: June 7th, 2024
Size: 7.82 Mb
first_2014_-_rajagopalan-_raj_-_soc_poster_20140626.pdf
MD5: f3e36f72b37f05e6ebd610c97e80edce
Format: application/pdf
Last Update: June 7th, 2024
Size: 3.67 Mb
Andreas SCHUSTER (Deutsche Telekom AG)
first_2014_-_schuster-_andreas_-_yara_basic_and_advanced_20140619.pdf
MD5: 1f12c5178cb99baec82886cc86a597c1
Format: application/pdf
Last Update: June 7th, 2024
Size: 736.86 Kb