Malware

Results: 7286



#Item
21Messaging, Malware and Mobile Anti-Abuse Working Group  M3AAWG Compromised User ID Best Practices Table of Contents 1. 2.

Messaging, Malware and Mobile Anti-Abuse Working Group M3AAWG Compromised User ID Best Practices Table of Contents 1. 2.

Add to Reading List

Source URL: www.m3aawg.org

Language: English - Date: 2015-09-28 22:02:43
    22Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn  Christian Seifert

    Rozzle: De-Cloaking Internet Malware Clemens Kolbitsch Benjamin Livshits and Benjamin Zorn Christian Seifert

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2017-01-10 09:15:12
      23Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1  Department of Computer Science, Georgia Institute of Technology, At

      Provably Secure Virus Detection: Using The Observer Effect Against Malware∗ Richard J. Lipton1 , Rafail Ostrovsky†‡2 , and Vassilis Zikas§‡3 1 Department of Computer Science, Georgia Institute of Technology, At

      Add to Reading List

      Source URL: web.cs.ucla.edu

      Language: English - Date: 2017-11-29 01:25:51
        24SEPTEMBERFighting malware and spam CONTENTS 2

        SEPTEMBERFighting malware and spam CONTENTS 2

        Add to Reading List

        Source URL: www.virusbulletin.com

        Language: English - Date: 2012-09-05 11:20:36
          25RHMD: Evasion-Resilient Hardware Malware Detectors

          RHMD: Evasion-Resilient Hardware Malware Detectors

          Add to Reading List

          Source URL: www.cs.ucr.edu

          Language: English - Date: 2017-09-01 17:18:20
            26FEBRUARYFighting malware and spam CONTENTS 2

            FEBRUARYFighting malware and spam CONTENTS 2

            Add to Reading List

            Source URL: www.virusbulletin.com

            Language: English - Date: 2010-10-25 05:18:16
              27C A S E S T UDY  Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

              C A S E S T UDY Faith Regional Health Services inoculates itself against malware Healthcare provider blocks malware and exploits with Malwarebytes Endpoint Security Business profile

              Add to Reading List

              Source URL: fr.malwarebytes.com

              Language: English - Date: 2017-10-26 18:27:26
                28OCTOBERFighting malware and spam VB100 COMPARATIVE REVIEW ON WINDOWS 2003 SERVER R2 INTRODUCTION We reached something of a milestone this month, as shortly

                OCTOBERFighting malware and spam VB100 COMPARATIVE REVIEW ON WINDOWS 2003 SERVER R2 INTRODUCTION We reached something of a milestone this month, as shortly

                Add to Reading List

                Source URL: www.virusbulletin.com

                Language: English - Date: 2011-10-31 13:50:56
                  29High Precision Screening for Android Malware with Dimensionality Reduction Britton Wolfe Information Analytics and Visualization Center, Indiana Univ.-Purdue Univ. Fort Wayne (IPFW), 2101 E. Coliseum Blvd., Fort Wayne, I

                  High Precision Screening for Android Malware with Dimensionality Reduction Britton Wolfe Information Analytics and Visualization Center, Indiana Univ.-Purdue Univ. Fort Wayne (IPFW), 2101 E. Coliseum Blvd., Fort Wayne, I

                  Add to Reading List

                  Source URL: people.cs.vt.edu

                  Language: English - Date: 2014-09-17 10:52:50
                    30A Quantitative Study of Accuracy in System Call-Based Malware Detection Davide Canali Andrea Lanzi

                    A Quantitative Study of Accuracy in System Call-Based Malware Detection Davide Canali Andrea Lanzi

                    Add to Reading List

                    Source URL: davidecanali.com

                    Language: English - Date: 2013-09-25 18:20:22