<--- Back to Details
First PageDocument Content
Computing / Antivirus software / Client honeypot / Malware / HoneyMonkey / Shellcode / Honeypot / Microsoft Security Essentials / Threat / Computer network security / Cyberwarfare / Computer security
Date: 2012-12-11 01:17:01
Computing
Antivirus software
Client honeypot
Malware
HoneyMonkey
Shellcode
Honeypot
Microsoft Security Essentials
Threat
Computer network security
Cyberwarfare
Computer security

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

Add to Reading List

Source URL: www.cs.berkeley.edu

Download Document from Source Website

File Size: 432,89 KB

Share Document on Facebook

Similar Documents

Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.doc

Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.doc

DocID: 1exSE - View Document

BadSignal-Reputation-bar.eps

BadSignal-Reputation-bar.eps

DocID: 1aS6A - View Document

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios Kevin Zhijie Chen Guofei Gu

DocID: 11wdB - View Document

Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.doc

Microsoft Word - Strider_HoneyMonkey_NDSS2006_2-column_Camera_Ready.doc

DocID: Xht7 - View Document

Computing / Client honeypot / Honeypot / Malware / Spyware / HoneyMonkey / Honeyd / Threat / Adware / Computer network security / Cyberwarfare / Computer security

2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:

DocID: PecZ - View Document