Malware analysis

Results: 349



#Item
121Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
122Computer network security / Program analysis / Software bugs / Computer security / Malware / Computer virus / Software testing / Static program analysis / Program slicing / Computing / Software engineering / Programming language theory

Microsoft Wordrevised.doc

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2011-06-08 19:45:42
123Malware / Hash list / Software / Computing / Antivirus software / Freeware / VirusTotal.com

Analysis  of  Malware  Dataset   Brad  Miller   Outline   •  Context  &  Data  Overview   •  Infrastructure  

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-10-15 16:34:38
124Computing / System software / Computer security / Malware / Application security / Android / Computer virus / Microsoft Security Essentials / Antivirus software / Software / Smartphones

Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis∗ Yu Feng Saswat Anand

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-09-05 00:09:41
125Computer security / Electronic commerce / Secure communication / Malware / Social engineering / Brian Krebs / Payment Card Industry Data Security Standard / Target Corporation / Data breach / Computer network security / Security / Cyberwarfare

COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION A “Kill Chain” Analysis of the 2013 Target Data Breach

Add to Reading List

Source URL: docs.ismgcorp.com

Language: English - Date: 2015-04-15 23:34:34
126Computer security / Honeypot / Malware / Client honeypot / Computer-aided audit tools / Physics / Data analysis / Analysis / Mind / Computer network security / Spamming / Science

security_analytics_project_black.ppt

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
127Cyberwarfare / PaX / Buffer overflow / Stack buffer overflow / Vulnerability / Application security / Formal methods / Malware / Static program analysis / Software bugs / Computer security / Computing

Software Security: A Formal Perspective (Notes for a Talk) Mart´ın Abadi1,2 1 2

Add to Reading List

Source URL: fm2012.cnam.fr

Language: English - Date: 2012-06-26 10:13:21
128Email / Portable Document Format / Computing / Electronic documents / Malware

Trend Micro Incorporated Research Paper 2012 The Taidoor Campaign AN IN-DEPTH ANALYSIS

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-08-23 14:09:19
129Computer network security / Crime prevention / National security / Public safety / Malware / Computer insecurity / Attack / International Multilateral Partnership Against Cyber Threats / Information security / Security / Computer security / Cyberwarfare

Tackling Attack Detection and Incident Response Research and Analysis by Intel Security and ESG By Jon Oltsik, Senior Principal Analyst

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-09 16:30:39
130Computer security / Kaspersky Lab / Malware / AVG / Microsoft Security Essentials / Antivirus software / Software / System software

Consumer EPP Comparative Analysis - Socially Engineered Malware

Add to Reading List

Source URL: www.nsslabs.com

Language: English - Date: 2014-10-27 14:18:09
UPDATE