Malware

Results: 7286



#Item
41C A S E S T UDY  Sagicor takes on malware and wins Malwarebytes Endpoint Security solution enables global financial services company to dramatically reduce malware infections, remediation time, and administration Busines

C A S E S T UDY Sagicor takes on malware and wins Malwarebytes Endpoint Security solution enables global financial services company to dramatically reduce malware infections, remediation time, and administration Busines

Add to Reading List

Source URL: de.malwarebytes.com

Language: English - Date: 2017-10-26 18:26:13
    42Case Study  RedSocks ensures that Air Miles meets European requirements Air Miles is assured of ongoing insights into the network environment thanks to the RedSocks Malware Threat Defender

    Case Study RedSocks ensures that Air Miles meets European requirements Air Miles is assured of ongoing insights into the network environment thanks to the RedSocks Malware Threat Defender

    Add to Reading List

    Source URL: www.redsocks.eu

    Language: English
      43VMR AY ANALY ZER  For Total Visibility and Defense Against Evasive Malware In the battle against malware, behavior-based analysis is one of the keys for security teams to detect and mitigate advanced threats. In

      VMR AY ANALY ZER For Total Visibility and Defense Against Evasive Malware In the battle against malware, behavior-based analysis is one of the keys for security teams to detect and mitigate advanced threats. In

      Add to Reading List

      Source URL: www.vmray.com

      Language: English - Date: 2018-06-09 05:35:20
        44Poster Misleading Metrics: On Evaluating ML for Malware with Confidence Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, Kumar Sharad, and Lorenzo Cavallaro Royal Holloway, University of London  Malware poses

        Poster Misleading Metrics: On Evaluating ML for Malware with Confidence Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, Kumar Sharad, and Lorenzo Cavallaro Royal Holloway, University of London Malware poses

        Add to Reading List

        Source URL: ksharad.com

        Language: English - Date: 2018-05-17 15:33:22
          45A Malware-Tolerant, Self-Healing Industrial Control System Framework Michael Denzel, Mark Ryan, and Eike Ritter University of Birmingham, School of Computer Science, B15 2TT Birmingham, United Kingdom {m.denzel,m.d.ryan,

          A Malware-Tolerant, Self-Healing Industrial Control System Framework Michael Denzel, Mark Ryan, and Eike Ritter University of Birmingham, School of Computer Science, B15 2TT Birmingham, United Kingdom {m.denzel,m.d.ryan,

          Add to Reading List

          Source URL: www.cs.bham.ac.uk.

          Language: English - Date: 2017-05-30 06:54:48
            46A Survey of Mobile Malware in the Wild Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner University of California, Berkeley

            A Survey of Mobile Malware in the Wild Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner University of California, Berkeley

            Add to Reading List

            Source URL: mfinifter.github.io

            Language: English - Date: 2016-04-20 20:43:40
              47DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

              DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

              Add to Reading List

              Source URL: people.cs.vt.edu

              Language: English - Date: 2018-04-09 14:09:44
                48C A S E S T UDY  At United Bank, there is no payoff for ransomware Bank uses Malwarebytes to prevent malware and exploits from cashing in Business profile

                C A S E S T UDY At United Bank, there is no payoff for ransomware Bank uses Malwarebytes to prevent malware and exploits from cashing in Business profile

                Add to Reading List

                Source URL: pt.malwarebytes.com

                Language: English - Date: 2018-04-04 17:51:10
                  49Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg,

                  Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery Hao Zhang, Danfeng (Daphne) Yao, and Naren Ramakrishnan Department of Computer Science, Virginia Tech Blacksburg,

                  Add to Reading List

                  Source URL: people.cs.vt.edu

                  Language: English - Date: 2014-03-02 07:04:29
                    50C A S E S T UDY  CellNetix inoculates its workstations against malware Pathology company diagnoses and eliminates malware infections quickly and easily Business profile

                    C A S E S T UDY CellNetix inoculates its workstations against malware Pathology company diagnoses and eliminates malware infections quickly and easily Business profile

                    Add to Reading List

                    Source URL: pl.malwarebytes.com

                    Language: English - Date: 2017-10-26 18:29:18