Trojan

Results: 685



#Item
101

Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability

Add to Reading List

Source URL: www.cryptoexperts.com

Language: English - Date: 2015-11-13 04:48:41
    102Malware / Computing / Cyberwarfare / Statistical classification / Trojan horses / Botnets / Machine learning / Antivirus software / Malware analysis / Support vector machine / Zeus / Computer virus

    Unveiling Zeus Automated Classification of Malware Samples Abedelaziz Mohaisen Omar Alrawi

    Add to Reading List

    Source URL: www2013.wwwconference.org

    Language: English - Date: 2014-07-21 08:47:00
    103

    Trojan Detection Using IC Fingerprinting

    Add to Reading List

    Source URL: akademik.bahcesehir.edu.tr

    Language: English - Date: 2012-08-27 08:33:31
      104

      Microsoft PowerPoint - The Moth Trojan.pptx

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2008-12-03 13:55:51
        105

        THE TROJAN Volume 14, No.1, Fall 1980

        Add to Reading List

        Source URL: umclibrary.crk.umn.edu

        Language: English - Date: 2014-09-30 14:09:56
          106

          Tommy Trojan’s Lament My name is Tommy Trojan, I’m only doin’ my job No-one ever told me, about this stinkin’ little NOD Even Ronnie Rootkit, he never said a word My life’s flashin’ by me, heuristics? How abs

          Add to Reading List

          Source URL: www.eset.co.cr

          - Date: 2011-03-02 16:33:09
            107

            THE TROJAN TORCH Published for Alumni, Faculty and Friends of UMC Spring 1979

            Add to Reading List

            Source URL: umclibrary.crk.umn.edu

            Language: English - Date: 2014-09-30 14:09:56
              108

              THE TROJAN Volume 14, No.2, Spring 1981

              Add to Reading List

              Source URL: umclibrary.crk.umn.edu

              Language: English - Date: 2014-09-30 14:09:56
                109

                Chasing cybercrime: network insights of Dyre and Dridex Trojan bankers. CYBER THREAT INTELLIGENCE REPORT April 2015 Follow us on twitter: @blueliv | https://twitter.com/blueliv Visit our blog: http://www.blueliv.com/blog

                Add to Reading List

                Source URL: www.blueliv.com

                Language: English - Date: 2015-04-22 07:31:18
                  110

                  Influence of the 6Li momentum distribution on Trojan Horse Method applications.

                  Add to Reading List

                  Source URL: www.phys.kyushu-u.ac.jp

                  Language: English - Date: 2012-09-06 05:17:44
                    UPDATE