Malware

Results: 7286



#Item
881

TERMS OF USE Cumulo Information System Security GmbH (hereafter referred to as CUMULO) provides nimbusec as a service to monitor web applications. It can identify manipulated and hacked websites (malware, defacements, bl

Add to Reading List

Source URL: nimbusec.com

Language: English - Date: 2016-02-04 06:05:17
    882

    AUTOVAC: Towards Automatically Extracting System Resource Constraints and Generating Vaccines for Malware Immunization Zhaoyan Xu SUCCESS Lab Texas A&M University

    Add to Reading List

    Source URL: faculty.cs.tamu.edu

    Language: English - Date: 2013-04-12 14:18:29
      883

      Flowers for Automated Malware Analysis Chengyu Song and Paul Royal Georgia Institute of Technology , ABSTRACT

      Add to Reading List

      Source URL: media.blackhat.com

      Language: English - Date: 2012-07-22 17:41:57
        884

        Deobfuscating Embedded Malware using Probable-Plaintext Attacks Christian Wressnegger1,2 , Frank Boldewin3 , and Konrad Rieck2 2 1

        Add to Reading List

        Source URL: user.informatik.uni-goettingen.de

        Language: English - Date: 2015-02-14 07:53:32
          885Computer network security / Software-defined networking / Intrusion detection system / OpenFlow / Botnet / Computer security / Deep packet inspection / Malware / Nox / Flow network

          MalwareMonitor: An SDN-based Framework for Securing Large Networks Zainab Abaid†‡ , Mohsen Rezvani† and Sanjay Jha† ‡ †

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2014-12-01 17:07:32
          886

          Powerful multi-layered defense delivers smart endpoint protection. Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one pow

          Add to Reading List

          Source URL: pl.malwarebytes.org

          Language: English
            887

            Information protection Frequently Asked Questions What happened? On January 27, 2015, we discovered that malware had been installed on some of Aurora’s workstations and servers via a sophisticated cyber attack. Immedia

            Add to Reading List

            Source URL: krebsonsecurity.com

            Language: English - Date: 2015-03-18 11:21:28
              888

              From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware Manos Antonakakis‡,∗ , Roberto Perdisci†,∗ , Yacin Nadji∗ , Nikolaos Vasiloglou‡ , Saeed Abu-Nimeh‡ , Wenke Lee∗ and David Dagon∗

              Add to Reading List

              Source URL: astrolavos.gatech.edu

              Language: English - Date: 2016-01-27 10:57:12
                889

                Appstore security September 5 lines of defence against malware Appstore security

                Add to Reading List

                Source URL: www.aipsi.org

                Language: English - Date: 2012-06-07 04:17:30
                  890

                  IRMA An Open-Source Incident Response & Malware Analysis Platform Alexandre Quint Guillaume Dedrie Fernand Lone Sang {aquint, gdedrie, flonesang}@quarkslab.com Hack.lu

                  Add to Reading List

                  Source URL: archive.hack.lu

                  Language: English - Date: 2014-10-23 17:41:44
                    UPDATE