Malware

Results: 7286



#Item
1Cybercrime / Computer network security / Cyberwarfare / Computing / Spamming / Malware / Domain generation algorithm / Botnet / Web threat / Blacklist

A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever† , Platon Kotzias∗ , Davide Balzarotti∓ , Juan Caballero∗ , Manos Antonakakis‡ {chazlever,manos}@gatech.edu, davide.balzarotti@eurec

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:17
2Security / Security breaches / Malware / Computer network security / Cybercrime / Multi-agent systems / Spamming / Rogue software / Botnet / Antivirus software / Rogue security software / Computer virus

Measuring Pay-per-Install: The Commoditization of Malware Distribution Juan Caballero† , Chris Grier∗‡ , Christian Kreibich∗‡ , Vern Paxson∗‡ † IMDEA Software Institute ∗ UC Berkeley ‡ ICSI juan.cabal

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2011-06-09 13:31:25
3Sponsor / Value-added tax / TED / Culture / Terminology / Human behavior

DIMVA Dear Prospective Sponsor. Since 2004 and 2009 the annual international IT-Security conferences DIMVA (Detection of Intrusions and Malware & Vulnerability Assessment) and ESSOS (Engineering Secure Software and Syste

Add to Reading List

Source URL: itsec.cs.uni-bonn.de

Language: English - Date: 2017-04-24 03:56:14
4

    Below you will find the following sample policies:   Antivirus and Malware Prevention Policy and Procedures (Template)   Employee Personal Device Use Terms and Conditions (Template) 

Add to Reading List

Source URL: eriskhub.com

Language: English - Date: 2015-07-09 10:30:25
    5

    A Closer Look at MiniDuke A Closer Look at MiniDuke Authors Marius TIVADAR – Team Leader, Malware Research

    Add to Reading List

    Source URL: labs.bitdefender.com

    Language: English - Date: 2017-05-03 10:46:10
      6

      MARCHFighting malware and spam MARCH 2012 VBSPAM COMPARATIVE REVIEW INTRODUCTION When I am asked what I do for a living and I say that I test

      Add to Reading List

      Source URL: www.virusbulletin.com

      Language: English - Date: 2012-03-15 11:47:05
        7

        Comprehensive Behavior Profiling for Proactive Android Malware Detection Britton Wolfe1 , Karim O. Elish2 , and Danfeng (Daphne) Yao2 1 Information Analytics and Visualization Center,

        Add to Reading List

        Source URL: people.cs.vt.edu

        Language: English - Date: 2014-08-12 14:49:29
          8

          MadeCR: Correlation-based Malware Detection for Cognitive Radio Yanzhi Dou, Kexiong (Curtis) Zeng, Yaling Yang, Danfeng (Daphne) Yao Virginia Polytechnic Institute and State University {yzdou, kexiong6, yyang8, danfeng}@

          Add to Reading List

          Source URL: people.cs.vt.edu

          Language: English - Date: 2015-01-31 12:17:02
            9

            C A S E S T UDY Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

            Add to Reading List

            Source URL: it.malwarebytes.com

            Language: English - Date: 2017-10-26 18:28:02
              10

              APRILFighting malware and spam CONTENTS 2

              Add to Reading List

              Source URL: www.virusbulletin.com

              Language: English - Date: 2012-04-02 11:56:47
                UPDATE