Похожие видео
array(10) {
[0]=>
object(stdClass)#8330 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "FRpcGwCedZ0"
["related_video_title"]=>
string(84) "Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(9) "Black Hat"
}
[1]=>
object(stdClass)#8303 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "Dfl2JI2eLc8"
["related_video_title"]=>
string(63) "Betraying the BIOS: Where the Guardians of the BIOS are Failing"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(9) "Black Hat"
}
[2]=>
object(stdClass)#8328 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "jVKl3GuazEs"
["related_video_title"]=>
string(47) "Attacking Encrypted USB Keys the Hard(ware) Way"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(9) "Black Hat"
}
[3]=>
object(stdClass)#8335 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "eZczwNFzxus"
["related_video_title"]=>
string(83) "The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them"
["posted_time"]=>
string(25) "3 недели назад"
["channelName"]=>
string(9) "Black Hat"
}
[4]=>
object(stdClass)#8314 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "jqtdQAFZSQ8"
["related_video_title"]=>
string(45) "Escalating Insider Threats Using VMware's API"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(9) "Black Hat"
}
[5]=>
object(stdClass)#8332 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "BT38K6NqETE"
["related_video_title"]=>
string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках"
["posted_time"]=>
string(27) "5 месяцев назад"
["channelName"]=>
string(22) "Раскадровка"
}
[6]=>
object(stdClass)#8327 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "TDk2RId8LFo"
["related_video_title"]=>
string(86) "Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(9) "Black Hat"
}
[7]=>
object(stdClass)#8337 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "wjZofJX0v4M"
["related_video_title"]=>
string(148) "LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(11) "3Blue1Brown"
}
[8]=>
object(stdClass)#8313 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "aircAruvnKk"
["related_video_title"]=>
string(101) "Но что такое нейронная сеть? | Глава 1. Глубокое обучение"
["posted_time"]=>
string(19) "7 лет назад"
["channelName"]=>
string(11) "3Blue1Brown"
}
[9]=>
object(stdClass)#8331 (5) {
["video_id"]=>
int(9999999)
["related_video_id"]=>
string(11) "NwnT15q_PS8"
["related_video_title"]=>
string(104) "DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r"
["posted_time"]=>
string(19) "1 год назад"
["channelName"]=>
string(16) "DEFCONConference"
}
}
Cloak & Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
Betraying the BIOS: Where the Guardians of the BIOS are Failing
Attacking Encrypted USB Keys the Hard(ware) Way
The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them
Escalating Insider Threats Using VMware's API
Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках
Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom's Wi-Fi Chipsets
LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры
Но что такое нейронная сеть? | Глава 1. Глубокое обучение
DEF CON 31 - SpamChannel - Spoofing Emails From 2M+ Domains & Virtually Becoming Satan - byt3bl33d3r