Malware analysis

Results: 349



#Item
151Software / Computer virus / Heuristic analysis / Email / Macro virus / Antivirus software / System software / Malware

E-MAIL VIRUSES DETECTION: DETECT E-MAIL VIRUS BY NETWORK TRAFFIC A Thesis in TCC402 Presented To

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 11:12:09
152Software / Computer virus / Melissa / Macro virus / Heuristic analysis / Computer worm / Virus / Avast! / Goodtimes virus / System software / Malware / Antivirus software

E-mail Viruses Detection: Detect E-mail virus by network traffic

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 11:11:12
153Malware / System software / Spyware / Computer security / Spamming / Trojan horse / Computer worm / Botnet / Rootkit / Cyberwarfare / Espionage / Computer network security

Malware, Informally Malware Categorisation in Support of Malware Policy Analysis Roger Clarke •

Add to Reading List

Source URL: www.rogerclarke.com

Language: English - Date: 2013-03-23 07:51:38
154Malware / Hardware virtualization / Rootkit / Hypervisor / Hyper-V / Xen / Antivirus software / Duqu / Paravirtualization / System software / Software / Virtual machines

Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System Tamas K. Lengyel Steve Maresca

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2014-09-01 11:00:03
155Computer security / Secure communication / Hacking / Military technology / Malware / Threat / National Security Agency / Data breach / Phishing / Computer network security / Security / Cyberwarfare

IBM Global Technology Services Managed Security Services IBM Security Services 2014 Cyber Security Intelligence Index Analysis of cyber attack and incident data from IBM’s worldwide

Add to Reading List

Source URL: media.scmagazine.com

Language: English - Date: 2014-06-16 14:39:45
156Computing / Malware / Honeypot / Network security / Threat / Botnet / Denial-of-service attack / Computer network security / Cyberwarfare / Computer security

2-2 A  n Incident Analysis Center “nicter” and its Social Commitment ETO Masashi and TAKAGI Yaichiro We have been developing the Network Incident analysis Center for Tactical Emergency

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 21:04:14
157Control flow / Microsoft-specific exception handling mechanisms / Computer virus / Exception handling / Subroutine / Pointer / Stack / Dynamic-link library / Computing / Software engineering / Computer programming

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 Rarely is that question asked – not least because the grammar is improper. It’s rare to see a virus advertised as

Add to Reading List

Source URL: pferrie.host22.com

Language: English
158X86-64 / Computer virus / 64-bit / COM file / X86 assembly language / X86 architecture / Computer architecture / Computing

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 2 AS ABOVE, SOBELOW Peter Ferrie Microsoft USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2012-01-02 14:03:02
159MMX / DEC Alpha / Instruction set / X86 architecture / Computer viruses / Computer architecture / X86 instructions / Instruction set architectures

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS IT’S A BIRD, IT’S A PLANE, IT’S FOOPERMAN! Peter Ferrie

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
160Computer virus / COM file / Dynamic-link library / Relocation / Portable Executable / Library / Dropper / Malware / Executable / Computing / System software / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 2 IT’S MENTAL STATIC! Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2013-05-16 13:54:48
UPDATE