Malware research

Results: 246



#Item
91Identifiers / Computer network security / Internet protocols / Email / Network architecture / Computer worm / Malware / Domain name / Top-level domain / Computing / Internet / Domain name system

Putting the Tea back into Cyber Terrorism SensePost Research BlackHat Briefings July 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
92Technology / Computer ethics / George Ledin / Malware / Virtue ethics / Information ethics / Business ethics / Social philosophy / Ethics / Philosophy

A Case Study in Malware Research Ethics Education When teaching bad is good

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:40:36
93Hypervisor / Rootkit / Malware / Hardware virtualization / Hyper-V / Xen / VMware / Virtualization / Two-factor authentication / System software / Software / Virtual machines

Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community Matei Zaharia Sachin Katti Chris Grier

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2012-01-13 22:47:07
94Cyberwarfare / CERT Polska / Internet in Poland / Client honeypot / Threat / Malware / Cyber Insider Threat / Computer security / Computer network security / Security

Fighting cyber threats – CERT perspective Current issues and research areas Piotr Kijewski () 4th EU-Japan Symposium on New Generation Networks and Future Internet 19th January 2012, Tokyo, Japan

Add to Reading List

Source URL: www.prime-pco.com

Language: English - Date: 2012-01-31 03:10:30
95Association for Computing Machinery / Engineering / Academia / Structure / International nongovernmental organizations / Institute of Electrical and Electronics Engineers / Malware

Weidong Cui C ONTACT I NFORMATION E DUCATION

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-11-18 13:03:45
96Security / Legal aspects of computing / Computer security / Internet privacy / Malware / Stored Communications Act / Computer Fraud and Abuse Act / Privacy / Telephone tapping / Computer law / Ethics / Law

Conducting Cybersecurity Research Legally and Ethically Aaron J. Burstein University of California, Berkeley (School of Law) Abstract

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-04-08 02:09:38
97Concurrent computing / Alert Logic / Cloud computing security / Malware / Honeypot / Attack / Botnet / Data center / Computer security / Computer network security / Computing / Cloud computing

Research on the Evolving State of Cloud Security Spring 2014 Research on the Evolving State of Cloud Security Spring 2014

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2014-10-17 17:39:07
98FTP clients / Internet Explorer / Human–computer interaction / Spamming / News aggregators / Malware / Botnet / World Wide Web / Phishing / Computing / Software / Microsoft Windows

The Leader in Cloud Security RESEARCH REPORT STATE OF THE WEB – Q2 2010

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:28
99Internet / Web 2.0 / Google Chrome / Spam / World Wide Web / Email spam / Malware / Firefox / Web browser / Software / Computing / Spamming

The Leader in Cloud Security RESEARCH  REPORT     STATE  OF  THE  WEB  –  Q4  2010  

Add to Reading List

Source URL: www.zscaler.com

Language: English - Date: 2015-04-01 12:38:29
100Social engineering / Computer network security / Computer crimes / Spyware / Malware / Phishing / Password / Trojan horse / Computer security / Espionage / Cybercrime / Security

CyberSecurity http://dcs.ics.forth.gr CyberSecurity Research in Crete Evangelos Markatos

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2006-12-13 04:32:43
UPDATE