Malware

Results: 7286



#Item
861

G OLDEN E YE: Efficiently and Effectively Unveiling Malware’s Targeted Environment Zhaoyan Xu1 , Jialong Zhang1 , Guofei Gu1 , and Zhiqiang Lin2 1 Texas A&M University, College Station, TX {z0x0427, jialong, guofei}@cs

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2014-07-07 11:58:34
    862

    Hack.lu edition 2012 A forensic analysis of Android Malware Wednesday, 24th October 2012 K EVIN A LLIX, Q UENTIN J EROME, R ADU S TATE,

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2012-10-31 10:30:13
      863Cyberwarfare / Computer security / Computer network security / Cybercrime / National security / Cyber-attack / Denial-of-service attack / Malware / Stuxnet / Botnet / Attack / Spyware

      Global Mapping of Cyber Attacks Ghita Mezzour, L. Richard Carley, Kathleen M. Carley 2014 CMU-ISR

      Add to Reading List

      Source URL: www.casos.cs.cmu.edu

      Language: English
      864Internet censorship / University of Toronto / Internet security / Computing / Software / Internet / Psiphon / Internet censorship circumvention / Citizen Lab / Gmail / Computer virus / Malware

      Research Brief March 2014 The Citizen Lab Maliciously Repackaged Psiphon Found

      Add to Reading List

      Source URL: citizenlab.org

      Language: English - Date: 2015-03-18 14:57:30
      865

      FAQ GeoTrust Web Site Anti-Malware Scan Customer FAQ What is the new GeoTrust Web Site Anti-Malware Scan?

      Add to Reading List

      Source URL: www.geotrust.com

      Language: English - Date: 2015-10-07 16:55:43
        866

        Detecting Malware Domains at the Upper DNS Hierarchy Manos Antonakakis‡* , Roberto Perdisci† , Wenke Lee* , Nikolaos Vasiloglou II‡ , and David Dagon* ‡ Damballa Inc.

        Add to Reading List

        Source URL: astrolavos.gatech.edu

        Language: English - Date: 2016-01-27 10:57:12
          867Computing / Computer security / Computer network security / Security engineering / Cyberwarfare / Intrusion detection system / System administration / Botnet / Computer virus / Malware / Alert correlation / Bro

          BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology

          Add to Reading List

          Source URL: faculty.cs.tamu.edu

          Language: English - Date: 2007-05-15 01:33:26
          868

          Malware Trend Report, Q2 2014 April | May | June 5 August 2014 Copyright RedSocks B.V. © 2014. All Rights Reserved.

          Add to Reading List

          Source URL: www.redsocks.nl

          Language: English - Date: 2016-01-25 04:02:43
            869

            Powerful anti-malware defense Because your current antivirus solution alone can’t protect your network As cyber attacks increase in frequency and sophistication, IT managers are starting to realize that relying on onl

            Add to Reading List

            Source URL: fr.malwarebytes.org

            Language: English
              870

              Windows Malware Annual Report 2014 And prognosis 2015 February 2015 Copyright RedSocks B.V. © All Rights Reserved.

              Add to Reading List

              Source URL: www.redsocks.nl

              Language: English - Date: 2016-01-25 04:02:33
                UPDATE