Computer worm

Results: 494



#Item
21What You Need to Know About...  Worm Inns By Bentley “Compost Guy” Christie

What You Need to Know About... Worm Inns By Bentley “Compost Guy” Christie

Add to Reading List

Source URL: www.redwormcomposting.com

Language: English - Date: 2015-03-05 13:55:29
22Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Malware and Exploits: An Introduction to Two Prominent Attack Vectors IN TODAY’S CYBER THREAT LANDSCAPE, NOT ALL ATTACKS ARE CREATED EQUAL Whether you’re a security practitioner focused on safeguarding your organizat

Add to Reading List

Source URL: www.sentinelone.com

Language: English - Date: 2016-05-23 01:13:39
23A Pact with the Devil Mike Bond and George Danezis Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, CB3 0FD, UK {Mike.Bond, George.Danezis}@cl.cam.ac.uk

A Pact with the Devil Mike Bond and George Danezis Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, CB3 0FD, UK {Mike.Bond, George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
24Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
25PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao§ , Vinod Yegneswaran† , Phillip Porras† , and Yan Chen§ , {vinod, porras}@csl

PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao§ , Vinod Yegneswaran† , Phillip Porras† , and Yan Chen§ , {vinod, porras}@csl

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2011-11-29 13:06:25
26Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

Security Considerations for Remote Electronic Voting over the Internet Avi Rubin AT&T Labs – Research Florham Park, NJ

Add to Reading List

Source URL: avirubin.com

Language: English - Date: 2012-11-01 14:51:07
27CAWDOR: Compiler Assisted Worm Defense Jun Yuan Rob Johnson  Department of Computer Science

CAWDOR: Compiler Assisted Worm Defense Jun Yuan Rob Johnson Department of Computer Science

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2016-01-22 13:13:04
    28The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen

    The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen

    Add to Reading List

    Source URL: home.nuug.no

    Language: English - Date: 2007-05-18 16:29:18
    29Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

    Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

    Add to Reading List

    Source URL: www1.icsi.berkeley.edu

    Language: English - Date: 2012-09-26 16:43:10
    30Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

    Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

    Add to Reading List

    Source URL: adam.shostack.org

    Language: English - Date: 2014-06-11 11:42:33