Malware

Results: 7286



#Item
871

Understanding the Prevalence and Use of Alternative Plans in Malware with Network Games Yacin Nadji Manos Antonakakis

Add to Reading List

Source URL: astrolavos.gatech.edu

Language: English - Date: 2016-01-27 10:57:12
    872Computer network security / Spamming / Cyberwarfare / Cybercrime / Spyware / Salvatore J. Stolfo / Simulation / VM / Computer virus / Hypervisor / Malware / Keystroke logging

    BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection! Brian M. Bowen 1 , Pratap Prabhu 1 , Vasileios P. Kemerlis 1 , Stelios Sidiroglou 2 , Angelos D. Keromytis 1 , and S

    Add to Reading List

    Source URL: ids.cs.columbia.edu

    Language: English - Date: 2011-09-04 10:44:35
    873

    Powerful multi-layered defense delivers smart endpoint protection. Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one pow

    Add to Reading List

    Source URL: es.malwarebytes.org

    Language: English
      874

      The Commercial Malware Industry Peter Gutmann University of Auckland (An Introductory Note) For those reading the slides rather than going to the talk:

      Add to Reading List

      Source URL: www.cs.auckland.ac.nz

      Language: English - Date: 2011-03-08 10:12:27
        875Social engineering / Cybercrime / Identity theft / Crime / Computing / Phishing / Spamming / Cyberspace / SMS phishing / Voice phishing / Online banking / Malware

        Fraud Trends HSBCnet Online Security Controls En français | En Español | 繁體中文 | 简体中文 | ‫اﻟﻌرﺑﯾﺔ‬ PUBLIC

        Add to Reading List

        Source URL: connect-content.us.hsbc.com

        Language: English - Date: 2015-11-24 16:06:57
        876Computing / Spamming / Cyberspace / Computer network security / Botnets / Multi-agent systems / Email / Computer virus / Email spam / Malware / Computer worm / Slenfbot

        The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen

        Add to Reading List

        Source URL: home.nuug.no

        Language: English - Date: 2007-05-18 16:29:18
        877

        DARWIN INSIDE THE MACHINES ... ILIOPOULOS, SZÖR, ADAMI DARWIN INSIDE THE MACHINES: MALWARE EVOLUTION AND THE CONSEQUENCES FOR COMPUTER SECURITY

        Add to Reading List

        Source URL: adamilab.msu.edu

        Language: English - Date: 2012-01-20 12:19:27
          878

          Malware Trend Report, Q4 2014 October | November | December January 2015 Copyright RedSocks B.V. © All Rights Reserved.

          Add to Reading List

          Source URL: www.redsocks.nl

          Language: English - Date: 2016-01-25 04:02:35
            879Computer security / Computer network security / Insider threat / Threat / Intrusion detection system / Anomaly Detection at Multiple Scales / Insider trading / Insider / Malware / Cyber Insider Threat / Salvatore J. Stolfo

            JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARYBehavioral Analysis of Insider Threat: A Survey and Bootstrapped Prediction in

            Add to Reading List

            Source URL: www.cs.umd.edu

            Language: English - Date: 2014-03-28 12:39:15
            880Computer security / Security / Global Information Assurance Certification / Computing / SANS Institute / Malware analysis / Computer security incident management / Malware / Computer forensics / Professional certification

            The SANS Technology Institute makes shorter groups of courses available to students who are unable to commit to a full master’s degree program. These certificate programs will augment your skills, provide specialized t

            Add to Reading List

            Source URL: www.sans.edu

            Language: English - Date: 2015-08-20 16:00:38
            UPDATE