Antivirus software

Results: 4432



#Item
911TECHNOLOGY NEWS  Instant Messaging: A New Target for Hackers Neal Leavitt

TECHNOLOGY NEWS Instant Messaging: A New Target for Hackers Neal Leavitt

Add to Reading List

Source URL: leavcom.com

Language: English - Date: 2013-04-12 14:46:09
912ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control Jintao Xiong School of Engineering Universidad del Turabo Gurabo PR 00778

ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control Jintao Xiong School of Engineering Universidad del Turabo Gurabo PR 00778

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:36:50
913An Assessment of Overt Malicious Activity Manifest in Residential Networks Gregor Maier1,2 , Anja Feldmann2, Vern Paxson1,3, Robin Sommer1,4, and Matthias Vallentin3 1

An Assessment of Overt Malicious Activity Manifest in Residential Networks Gregor Maier1,2 , Anja Feldmann2, Vern Paxson1,3, Robin Sommer1,4, and Matthias Vallentin3 1

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2011-04-23 13:52:19
914Abusing File Processing in Malware Detectors for Fun and Profit Suman Jana and Vitaly Shmatikov The University of Texas at Austin Abstract—We systematically describe two classes of evasion exploits against automated ma

Abusing File Processing in Malware Detectors for Fun and Profit Suman Jana and Vitaly Shmatikov The University of Texas at Austin Abstract—We systematically describe two classes of evasion exploits against automated ma

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2012-03-06 01:37:39
915Security Toolbox for Detecting Novel and Sophisticated Android Malware∗ Benjamin Holland, Tom Deering, Suresh Kothari Department of Electrical and Computer Engineering Iowa State University, Ames, Iowa 50010, Email: {b

Security Toolbox for Detecting Novel and Sophisticated Android Malware∗ Benjamin Holland, Tom Deering, Suresh Kothari Department of Electrical and Computer Engineering Iowa State University, Ames, Iowa 50010, Email: {b

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-04-07 20:50:06
916Ge ne r a l Com put in g Tips © DP Com put ing 2002 by David Perkovic How to Shutdown Your Computer Properly Always shutdown your computer and any applications you have open properly. Only use the reset

Ge ne r a l Com put in g Tips © DP Com put ing 2002 by David Perkovic How to Shutdown Your Computer Properly Always shutdown your computer and any applications you have open properly. Only use the reset

Add to Reading List

Source URL: www.dpcomputing.com.au

Language: English - Date: 2009-06-02 21:16:10
917Microsoft Word - Spyware.doc

Microsoft Word - Spyware.doc

Add to Reading List

Source URL: www.propertypro.co.uk

Language: English - Date: 2013-05-15 06:39:39
918White Paper  Build a Better Sandbox. Create a working strategy for comprehensive malware protection.

White Paper Build a Better Sandbox. Create a working strategy for comprehensive malware protection.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-01 13:49:51
919HEALTH INFORMATICS  Privacy, security and confidentiality JO LUCK

HEALTH INFORMATICS Privacy, security and confidentiality JO LUCK

Add to Reading List

Source URL: www.achi.org.au

Language: English - Date: 2014-11-23 06:35:35
920Microsoft Wordrevised

Microsoft Wordrevised

Add to Reading List

Source URL: rs.ieee.org

Language: English