Malware research

Results: 246



#Item
161Public safety / Ethics / Cryptography / Malware / Computer security / Security engineering / Internet privacy / Privacy / Information security / Security / Crime prevention / National security

Research Institute for Security in the Information Society RISIS «IT Security is a prerequisite for the sustainable development of the information society.» Prof. Dr. Eric Dubuis, Head of RISIS

Add to Reading List

Source URL: www.forschung.ti.bfh.ch

Language: English - Date: 2014-10-06 03:12:33
162

ULF LÖSCHE Head of Malware Research | CeBIT 2014 VOM SPAM ZUM TEST Malware-Analyse bei der AV-TEST GmbH

Add to Reading List

Source URL: www.av-test.org

Language: German - Date: 2014-03-21 11:49:31
    163Hacking / Military technology / International Multilateral Partnership Against Cyber Threats / International Telecommunication Union / Cyberwarfare / War / Military science / Computer security / Department of Defense Strategy for Operating in Cyberspace / Computer crimes / Security / Electronic warfare

    Cybersecurity for improved resilience against cyber threats • Research on cybersecurity for improved resilience against cyber threats (leak of information, denial of service, malware) • Develop technologies and strat

    Add to Reading List

    Source URL: www.ictcluster.lu

    Language: English - Date: 2012-10-09 04:08:26
    164Computing / Antivirus software / Malware / Computer virus

    Fixing the Fundamental Failures of End-Point Security Managing vulnerabilities when perimeter protection has failed Dr. Stefan Frei Research Analyst Director

    Add to Reading List

    Source URL: media.hacking-lab.com

    Language: English - Date: 2011-06-08 04:51:58
    165Computing / Client honeypot / Honeypot / Malware / Spyware / HoneyMonkey / Honeyd / Threat / Adware / Computer network security / Cyberwarfare / Computer security

    2nd Generation Honeyclients Robert Danford SANS Internet Storm Center Research funded in part with a grant from StillSecure (http://www.stillsecure.com) Author can be reached at:

    Add to Reading List

    Source URL: handlers.dshield.org

    Language: English - Date: 2009-09-30 11:18:14
    166Computer file formats / Dynamic-link library / Windows XP / Portable Executable / Side-by-side assembly / Static library / Computing / Software / System software

    DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry SESSION ID: HTA-W04A Amanda Stewart Malware Research Engineer

    Add to Reading List

    Source URL: www.rsaconference.com

    Language: English - Date: 2014-02-19 23:18:07
    167Computer crimes / Social engineering / Internet ethics / Technology / Malware / Scareware / Twitter / Email spam / Online advertising / Internet / Spamming / Computing

    Security Challenges in An Increasingly Connected World Yi-Min Wang Director, Internet Services Research Center (ISRC) Microsoft Research, Redmond SRDS 2009 Opening Keynote, September 28, 2009

    Add to Reading List

    Source URL: www.cse.buffalo.edu

    Language: English - Date: 2009-10-19 11:20:44
    168Spamming / Computing / Phishing / Internet privacy / Malware / Scareware / Email / Crime / Computer crimes / Social engineering / Internet

    How Users Perceive and Respond to Security Messages: A NeuroIS Research Agenda and Empirical Study* Bonnie Brinton Anderson, Anthony Vance Information Systems Department, Brigham Young University [removed], bonn

    Add to Reading List

    Source URL: security.byu.edu

    Language: English - Date: 2014-06-09 17:48:22
    169Cross-platform software / Computer architecture / Linux / Malware / Debian / International Cybercrime / Department of Defense Cyber Crime Center / Software / Computing / Computer crimes

    Linux and Law Enforcement Challenges and Opportunities Dr. Joshua I. James Digital Forensic Investigation Research Laboratory SoonChunHyang University [removed]

    Add to Reading List

    Source URL: events.linuxfoundation.org

    Language: English - Date: 2014-11-04 09:23:50
    170Computing / Internet Systems Consortium / Root name server / Domain Name System Security Extensions / Botnet / Malware / Top-level domain / Name server / Domain name system / Internet / Network architecture

    OARC Briefing OARC Briefing DNS Operations, Analysis and Research Center

    Add to Reading List

    Source URL: www.dns-oarc.net

    Language: English - Date: 2007-03-21 10:22:28
    UPDATE