Endpoint

Results: 1191



#Item
151New Mexico / Manhattan Project / Federally Funded Research and Development Centers / United States Department of Energy national laboratories / University of California / Los Alamos National Laboratory / United States Department of Energy / Los Alamos National Security / Los Alamos /  New Mexico / Los Alamos

Overview of the LANL Globus Endpoint GlobusWorld 2016 Lightning Talk Giovanni Cone UNCLASSIFIED

Add to Reading List

Source URL: www.globusworld.org

Language: English - Date: 2016-04-22 12:36:31
152

ÉTUDE DE CAS Faith Regional Health Services se protège contre les programmes malveillants Un prestataire de soins de santé bloque les malwares et les exploits grâce à Malwarebytes Endpoint Security.

Add to Reading List

Source URL: fr.malwarebytes.com

Language: French - Date: 2016-07-06 12:34:39
    153

    C A S O P R ÁC T ICO Vermeer implementa sistemas de detección frente al malware a nivel industrial El equipo de seguridad usa Malwarebytes Endpoint Security para desinfectar y prevenir nuevas infecciones, además de s

    Add to Reading List

    Source URL: es.malwarebytes.com

    Language: Spanish - Date: 2016-07-06 12:32:41
      154Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malwarebytes / Malware / Avira / Computer virus / IObit

      C A S E S T U DY Cambria Countyprevents malware emergencies Malwarebytes Endpoint Security sounds the alarm, stopping exploits before they cause problems

      Add to Reading List

      Source URL: es.malwarebytes.com

      Language: English - Date: 2016-07-07 18:34:11
      155Software engineering / Computer programming / Computing / GNUstep / NeXT / Objective-C / Application programming interface / Transmission Control Protocol / Go

      Hybrid Session Verification through Endpoint API Generation Raymond Hu and Nobuko Yoshida Imperial College London Abstract. This paper proposes a new hybrid session verification methodology for applying session types di

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2015-11-25 16:51:21
      156Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Bitdefender / Malwarebytes / Malware / Zero-day / Avira / Computer virus / IObit

      C A S E S T U DY Standard School District gives malware a failing grade District adopts Malwarebytes to block malware and improve endpoint performance Business profile

      Add to Reading List

      Source URL: de.malwarebytes.com

      Language: English - Date: 2016-07-07 18:32:31
      157Software / System software / Computer security / Antivirus software / Malwarebytes Anti-Malware / Malware / Avira / IObit / Bleeping Computer

      C A S E S T U DY Sun Products Corporation cleans up malware Leading provider of household products adds a layer of protection against malware and exploits with Malwarebytes Endpoint Security

      Add to Reading List

      Source URL: www.malwarebytes.com

      Language: English - Date: 2016-08-19 18:33:39
      158Software / Computer security / System software / Antivirus software / Malwarebytes Anti-Malware / Malware / Computer virus / Avira / Zero-day

      C A S E S T U DY Enterprise Elementary School District expels malware Malwarebytes Endpoint Security keeps staff PCs clean, digital curriculum flowing, and students learning

      Add to Reading List

      Source URL: pt.malwarebytes.com

      Language: English - Date: 2016-07-07 18:41:23
      159

      FA L L S T U D I E Faith Regional Health Services impft sich selbst gegen Schadsoftware Gesundheitsdienstleister blockiert Schadsoftware und Exploits mit Malwarebytes Endpoint Security

      Add to Reading List

      Source URL: de.malwarebytes.com

      Language: German - Date: 2016-07-06 12:31:12
        160Machine learning / Word2vec / Random walk / Graph / Mathematics / Learning / Application software

        Detecting malicious behavior in network and endpoint logs is an extremely challenging task: large and complex data sets, highly dynamic innocuous behavior, and intelligent adversaries contribute to the difficulty. Even a

        Add to Reading List

        Source URL: mmds-data.org

        Language: English - Date: 2016-06-23 15:50:48
        UPDATE