Malware

Results: 7264



#Item
1Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1  Department of Computer Science, Georgia Institute of Technology, At

Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1 Department of Computer Science, Georgia Institute of Technology, At

Add to Reading List

Source URL: web.cs.ucla.edu

- Date: 1969-12-31 19:00:00
    2SEPTEMBERFighting malware and spam CONTENTS 2

    SEPTEMBERFighting malware and spam CONTENTS 2

    Add to Reading List

    Source URL: www.virusbulletin.com

    - Date: 1969-12-31 19:00:00
      3RHMD: Evasion-Resilient Hardware Malware Detectors

      RHMD: Evasion-Resilient Hardware Malware Detectors

      Add to Reading List

      Source URL: www.cs.ucr.edu

      - Date: 1969-12-31 19:00:00
        4FEBRUARYFighting malware and spam CONTENTS 2

        FEBRUARYFighting malware and spam CONTENTS 2

        Add to Reading List

        Source URL: www.virusbulletin.com

        - Date: 1969-12-31 19:00:00
          5C A S E S T UDY  Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

          C A S E S T UDY Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

          Add to Reading List

          Source URL: fr.malwarebytes.com

          - Date: 1969-12-31 19:00:00
            6OCTOBERFighting malware and spam VB100 COMPARATIVE REVIEW ON WINDOWS 2003 SERVER R2 INTRODUCTION We reached something of a milestone this month, as shortly

            OCTOBERFighting malware and spam VB100 COMPARATIVE REVIEW ON WINDOWS 2003 SERVER R2 INTRODUCTION We reached something of a milestone this month, as shortly

            Add to Reading List

            Source URL: www.virusbulletin.com

            - Date: 1969-12-31 19:00:00
              7High Precision Screening for Android Malware with Dimensionality Reduction Britton Wolfe Information Analytics and Visualization Center, Indiana Univ.-Purdue Univ. Fort Wayne (IPFW), 2101 E. Coliseum Blvd., Fort Wayne, I

              High Precision Screening for Android Malware with Dimensionality Reduction Britton Wolfe Information Analytics and Visualization Center, Indiana Univ.-Purdue Univ. Fort Wayne (IPFW), 2101 E. Coliseum Blvd., Fort Wayne, I

              Add to Reading List

              Source URL: people.cs.vt.edu

              - Date: 1969-12-31 19:00:00
                8A Quantitative Study of Accuracy in System Call-Based Malware Detection Davide Canali Andrea Lanzi

                A Quantitative Study of Accuracy in System Call-Based Malware Detection Davide Canali Andrea Lanzi

                Add to Reading List

                Source URL: davidecanali.com

                - Date: 1969-12-31 19:00:00
                  9APRILFighting malware and spam CONTENTS  3

                  APRILFighting malware and spam CONTENTS 3

                  Add to Reading List

                  Source URL: www.virusbulletin.com

                  - Date: 1969-12-31 19:00:00
                    10Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

                    Prudent Practices for Designing Malware Experiments: Status Quo and Outlook

                    Add to Reading List

                    Source URL: oaklandsok.github.io

                    - Date: 1969-12-31 19:00:00