Malware research

Results: 246



#Item
1A Closer Look at MiniDuke  A Closer Look at MiniDuke Authors Marius TIVADAR – Team Leader, Malware Research

A Closer Look at MiniDuke A Closer Look at MiniDuke Authors Marius TIVADAR – Team Leader, Malware Research

Add to Reading List

Source URL: labs.bitdefender.com

Language: English - Date: 2017-05-03 10:46:10
    2DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

    DANFENG (DAPHNE) YAO RESEARCH INTERESTS Software and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, c

    Add to Reading List

    Source URL: people.cs.vt.edu

    Language: English - Date: 2018-04-09 14:09:44
      3Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection of malware on websi

      Research Statement Michalis Faloutsos My research focuses on computer security and networks and can be grouped into the following, partiallyoverlapping areas: 1. Web security focusing on the detection of malware on websi

      Add to Reading List

      Source URL: www.cs.unm.edu

      - Date: 2011-01-29 14:01:59
        4RiskIQ Research: Compromised eCommerce Sites Lead to Web-Based Keyloggers Most methods used by attackers to target consumers are commonplace, such as phishing and the use of malware to target payment cards. Others, such

        RiskIQ Research: Compromised eCommerce Sites Lead to Web-Based Keyloggers Most methods used by attackers to target consumers are commonplace, such as phishing and the use of malware to target payment cards. Others, such

        Add to Reading List

        Source URL: safe.riskiq.com

        - Date: 2016-12-29 14:59:46
          5Research  How to interpret networkbased malware detection The impact of malware acquisition and processing on network detection and threat classification systems By Günter Ollmann

          Research How to interpret networkbased malware detection The impact of malware acquisition and processing on network detection and threat classification systems By Günter Ollmann

          Add to Reading List

          Source URL: www.vectranetworks.com

          - Date: 2016-07-08 13:34:24
            6MADAM: A Multi Level Anomaly Detector for Android Malware Fabio Martinelli National Research Council of Italy (CNR) Joint work with Andrea Saracino, Daniele Sgandurra et al.

            MADAM: A Multi Level Anomaly Detector for Android Malware Fabio Martinelli National Research Council of Italy (CNR) Joint work with Andrea Saracino, Daniele Sgandurra et al.

            Add to Reading List

            Source URL: comsec.spb.ru

            - Date: 2015-12-03 06:47:11
              7Research Brief June 2014 The Citizen Lab  Police Story: Hacking Team’s Government Surveillance Malware

              Research Brief June 2014 The Citizen Lab Police Story: Hacking Team’s Government Surveillance Malware

              Add to Reading List

              Source URL: citizenlab.org

              - Date: 2015-03-18 14:57:42
                8Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware Tudor Dumitras, Symantec Research Labs

                Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware Tudor Dumitras, Symantec Research Labs

                Add to Reading List

                Source URL: static.usenix.org

                - Date: 2011-07-08 13:42:23
                  9Operation Liberpy’: Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab – version 1.1

                  Operation Liberpy’: Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab – version 1.1

                  Add to Reading List

                  Source URL: www.welivesecurity.com

                  - Date: 2015-07-10 11:30:34
                    10Press Release Embedded Software Security Solutions to Ride Rising Tide of Internet of Things, According to VDC Research Ubiquitous connectivity will drive 26% annual revenue growth for vendors to help thwart malware and

                    Press Release Embedded Software Security Solutions to Ride Rising Tide of Internet of Things, According to VDC Research Ubiquitous connectivity will drive 26% annual revenue growth for vendors to help thwart malware and

                    Add to Reading List

                    Source URL: www.vdcresearch.com

                    Language: English - Date: 2016-02-01 13:56:30