Malware

Results: 7286



#Item
971

NGFW - Stream Based Malware Detection Es werden nur einzelne Pakete überprüft. Eine Kombination mehrerer Pakete ist aufgrund der erforderlichen Geschwindigkeit nicht möglich - schließlich sollen NGFWs mehrere GBit-Po

Add to Reading List

Source URL: www.nrw-units.de

Language: German - Date: 2014-07-31 10:09:02
    972

    AccessMiner: Using System-Centric Models for Malware Protection Andrea Lanzi Davide Balzarotti

    Add to Reading List

    Source URL: www.iseclab.org

    Language: English
      973

      Malwarebytes Anti-Malware Users Guide VersionFebruary 2014 Notices

      Add to Reading List

      Source URL: static-cdn.malwarebytes.org

      Language: English
        974

        Symantec Intelligence Symantec Intelligence Report: August 2011 Turbulent financial markets trigger a return to stock pump-and-dump spam; Master Boot Record (MBR) malware may be making a comeback

        Add to Reading List

        Source URL: www.symantec.com

        Language: English - Date: 2011-08-24 04:05:58
          975

          Rotalum`e: A Tool for Automatic Reverse Engineering of Malware Emulators Monirul Sharif Andrea Lanzi Jonathon Giffin Wenke Lee School of Computer Science, Georgia Institute of Technology {msharif, andrea, giffin, wenke}@

          Add to Reading List

          Source URL: www.iseclab.org

          Language: English
            976

            Software Updates vs. Web Threats HOW WELL DOES PATCHING SOFTWARE PROTECT AGAINST MALWARE? Dennis Technology Labs www.DennisTechnologyLabs.com Follow @DennisTechLabs on Twitter.com This test explores how far software upda

            Add to Reading List

            Source URL: dennistechnologylabs.com

            Language: English - Date: 2014-10-08 04:30:46
              977

              Characterizing Malware with MAEC and STIX v1.0 April 21st, 2014 Introduction This document describes the use of the Malware Attribute Enumeration and Characterization (MAEC)

              Add to Reading List

              Source URL: stix.mitre.org

              Language: English
                978

                Battling the botnets and the zombies BrandProtect puts malware in its place The proliferation of malware is a cause for increasing concern for businesses and consumers. While many instances of malware are little more tha

                Add to Reading List

                Source URL: www.brandprotect.com

                Language: English
                  979

                  An Epidemiological Study of Malware Encounters in a Large Enterprise Ting-Fang Yen Victor Heorhiadi

                  Add to Reading List

                  Source URL: www.cs.unc.edu

                  Language: English - Date: 2014-11-03 17:46:16
                    980

                    Extremely Scalable Storage and Clustering of Malware Metadata Matthew Asquith About The Author Matthew Asquith graduated from the University of Sydney in 2006 with a Bachelor IT with first-class honours. Since then he ha

                    Add to Reading List

                    Source URL: www.eicar.org

                    Language: English - Date: 2014-11-18 08:15:14
                      UPDATE