Study Makes Me Happy!
This is my personal study notes, may be computer science, mathematics, and even diary, everything. I hope to motivate myself through this project and its about passionate living and lifelong learning.
Items marked with (-)
are still works in progress.
Items marked with (el)
means external links.
- Lecture 1: The Learning Problem
- Lecture 2: Learning to Answer Yes/No
- Lecture 3: Types of Learning
- Lecture 4: Feasibility of Learning
- Homework 1
- Set-UID Program Vulnerability Lab
- Format-String Vulnerability Lab
- Shellshock Attack Lab
- Buffer Overflow Vulnerability Lab
- Chapter 1: Introduction to the Linux Kernel
- Chapter 2: Getting Started with the Kernel
- Chapter 3: Process Management
- Chapter 4: Process Scheduling
- Chapter 5: System Calls
- Chapter 6: Kernel Data Structures
- Chapter 7: Interrupts and Interrupt Handlers
- Chapter 8: Bottom Halves and Deferring Work
- Chapter 9: An Introduction to Kernel Synchronization
- Chapter 10: Kernel Synchronization Methods
- Chapter 11: Timers and Time Management
- Chapter 12: Memory Management
- Chapter 13: The Virtual Filesystem
- Chapter 14: The Block I/O Layer
- Chapter 15: The Process Address Space
- Chapter 16: The Page Cache and Page Writeback
- (-) Chapter 17: Devices and Modules
- (el) How to Read an Engineering Research Paper
- All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
- MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection
- DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
- DroidNative: Semantic-Based Detection of Android Native Code Malware
- MaMaDroid: Detecting Android malware by building Markov chains of behavorial models
- Android Malware Classification by Applying Online Machine Learning
- A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls
- DynaLog: An automated dynamic analysis framework for characterizing Android applications
- EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning
- Chapter 1: Introduction
- Chapter 2: Network Models
- Chapter 3: Introduction to Physical Layer
- Chapter 4: Digital Transmission
- Chapter 5: Analog Transmission
- Chapter 6: Bandwidth Utilization: Multiplexing and Spectrum Spreading
- Chapter 7: Transmission Media
- Chapter 8: Switching
- Chapter 9: Introduction to Data-Link Layer
- Chapter 10: Error Detection and Correction
- Chapter 11: Data Link Control (DLC)
- Chapter 12: Media Access Control (MAC)
- Chapter 13: Wired LANs: Ethernet
- Chapter 14: Other Wired Network
- Chapter 15: Wireless LANs
- (-) Chapter 16: Other Wireless Network
MIT LICENSE.
COPYRIGHT (C) 2017 firmy
Started on 2017/04/27 by Firmy Yang