Malware analysis

Results: 349



#Item
341Botnets / Spamming / Cyberwarfare / Computer security / Storm botnet / Mariposa botnet / Defence Intelligence / Malware / Rustock botnet / Computing / Computer network security / Multi-agent systems

Insights from the Analysis of the Mariposa Botnet Prosenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi NCFTA Canada & the Computer Security Laboratory

Add to Reading List

Source URL: www.ncfta.ca

Language: English - Date: 2010-09-10 20:48:10
342Multi-agent systems / Computer security / Spamming / Denial-of-service attacks / Botnet / Malware / Denial-of-service attack / Rootkit / Transmission Control Protocol / Computer network security / Computing / Cyberwarfare

Festi  botnet  analysis  and  investigation   Aleksandr  Matrosov,  Eugene  Rodionov   Keywords: Festi, spam, botnet, rootkit, DDoS, OOP, HIPS, firewall

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2012-11-27 10:18:00
343Internet protocols / Internet standards / Daemon / Finger protocol / Sendmail / Password / Computer viruses / Malware / Antivirus software / System software / Software / Computing

With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988  

Add to Reading List

Source URL: www.utdallas.edu

Language: English - Date: 2004-04-05 18:42:25
344Software / Computer viruses / Heuristic analysis / Michelangelo / Macro virus / Virus Bulletin / Polymorphic code / Simile / Malware / System software / Antivirus software

Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September[removed]Computer Virus Strategies and Detection

Add to Reading List

Source URL: www.emis.de

Language: English - Date: 2010-07-18 14:17:42
345Spamming / Malware / Internet / Network architecture / Transmission Control Protocol / Botnet / User Datagram Protocol / DoSnet / Skype protocol / Computing / Computer network security / Multi-agent systems

Malware Analysis Report New C&C Protocol for ZeroAccess/Sirefef June 2012

Add to Reading List

Source URL: www.kindsight.net

Language: English - Date: 2012-06-27 10:34:00
346Computer network security / Spamming / Computer security / Botnets / Malware / Rootkit / Computer virus / Trojan horse / Storm botnet / Computing / Multi-agent systems / Cyberwarfare

Malware Analysis Report Botnet: ZeroAccess/Sirefef February 2012

Add to Reading List

Source URL: www.kindsight.net

Language: English - Date: 2012-02-24 16:07:42
347Computer network security / Electronic commerce / EMC Corporation / Hacking / Malware / Vulnerability / RSA / Advanced persistent threat / Exploit / Cryptography / Cyberwarfare / Computer security

THE VOHO CAMPAIGN: AN IN DEPTH ANALYSIS RSA FirstWatchSM Intelligence Report

Add to Reading List

Source URL: blogs.rsa.com

Language: English - Date: 2013-01-19 11:57:16
348Botnets / Multi-agent systems / Malware / Cyberwarfare / Rootkits / Torpig / Srizbi botnet / Mebroot / Fast flux / Computing / Spamming / Computer network security

Malware Analysis Analysis of a

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2013-08-28 21:33:56
349Botnets / Malware / Multi-agent systems / Cyberwarfare / Rootkits / Torpig / Srizbi botnet / Mebroot / Fast flux / Computing / Spamming / Computer network security

Malware Analysis Analysis of a Botnet Takeover

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2011-02-11 11:42:37
UPDATE