Trojan

Results: 685



#Item
151System software / Android / Embedded Linux / Malware / Cloud clients / Android Market / Android software development / Computer virus / Trojan horse / Software / Computing / Smartphones

PREC: Practical Root Exploit Containment for Android Devices Tsung-Hsuan Ho, Daniel Dean, Xiaohui Gu, William Enck Department of Computer Science North Carolina State University

Add to Reading List

Source URL: www.enck.org

Language: English
152Aegean civilizations / Troas / Heinrich Schliemann / Mycenae / Philhellenes / Papier-mâché / Trojan War / Ancient Greece / Trojans / Troy / Visual arts

Liz Glynn No Second Troy Liz Glynn

Add to Reading List

Source URL: www.pitzer.edu

Language: English - Date: 2012-05-23 13:51:26
153Computer security / SecuriTeam / Malware / Beyond Security / Trojan horse / WinFS / Hacker / Phishing / Computing / Social engineering / Cybercrime

Beyond Security Automatic Vulnerability Assessment in the Year 2013 Myth or Reality

Add to Reading List

Source URL: beyondsecurity.de

Language: English - Date: 2012-08-21 09:36:12
154Computer network security / Computer security / DAFCA / Public safety / Trojan horses / Hardware Trojan / Security

HOSTIEEE International Workshop on Hardware-Oriented Security and Trust June 9, 2008, Anaheim Convention Center, Room 204A, Anaheim, CA

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2009-10-29 22:35:29
155Field-programmable gate array / Electronic engineering / Hardware Trojan / Physical Unclonable Function / Microsemi

Microsoft Word - HOST2013-Program-Farinaz-v4.docx

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2013-06-02 08:49:38
156PUF / Physical Unclonable Function / Randomness / Hardware Trojan

Microsoft Word - HOST14FinalProgram.doc

Add to Reading List

Source URL: www.engr.uconn.edu

Language: English - Date: 2014-08-20 05:16:08
157Spyware / Computer network security / Malware / Rogue software / Computer surveillance / Internet privacy / Trojan horse / Employee monitoring software / Keystroke logging / Espionage / Security / Surveillance

Before the Federal Trade Commission Washington, DCIn the Matter of Awarenesstech.com, RemotePCSpy.com,

Add to Reading List

Source URL: epic.org

Language: English - Date: 2008-04-03 14:48:58
158Computer virus / Trojan horse / Software / Computer worms / Antivirus software / Malware / System software / Social engineering

Microsoft Security Intelligence Report Volume 16 | July through December, 2013 Algeria This document is for informational purposes only. MICROSOFT MAKES NO

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2014-05-14 11:56:54
159Elevator / Emergency power system / Malware / Computing / Mark Russinovich / Year of birth uncertain / Trojan horse

This is a work of fiction. All of the characters, organizations, and events portrayed in this novel are either products of the author’s imagination or are used fictitiously. THOMAS DUNNE BOOKS . An imprint of St. Ma

Add to Reading List

Source URL: www.trojanhorsethebook.com

Language: English - Date: 2012-07-30 20:46:19
160Iliad / Troilus / Achilles / Black-figure pottery / Trojan War / Hector / Athena / Red-figure pottery / Odysseus / Greek mythology / Mythology / Ancient Greece

DOC Document

Add to Reading List

Source URL: www.britishmuseum.org

Language: English
UPDATE