/
|
Computer viruses - a high-tech desease.pdf
|
89.5 MB
|
Malicious Cryptography - Exposing Cryptovirology.pdf
|
30.5 MB
|
Malware Forensics Investigating and Analyzing Malicious Code.pdf
|
26.2 MB
|
Computer Virus Survival Guide.pdf
|
26.1 MB
|
Malware_ Von Viren, W+-rmern, Hackern und Trojanern und wie man sich vor ihnen sch+-tzt.pdf
|
22.6 MB
|
Les virus informatiques_ th+йorie, pratique et applications.pdf
|
20.5 MB
|
Malware Detection.pdf
|
19.4 MB
|
Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf
|
14.7 MB
|
Computer Viruses and Malware.pdf
|
11.3 MB
|
PC Magazine Fighting Spyware Viruses and Malware.pdf
|
10.9 MB
|
Crimeware_ Understanding New Attacks and Defenses.chm
|
10.8 MB
|
Malware Analyst's Cookbook and DVD.pdf
|
9.4 MB
|
Mobile Malware Attacks and Defense.pdf
|
7.1 MB
|
Malware_ Fighting Malicious Code.chm
|
6.7 MB
|
Identifying Malicious Code Through Reverse Engineering.pdf
|
6.5 MB
|
On self-reproducing computer programs.pdf
|
6.5 MB
|
Disk-Level Behavioral Virus Detection.pdf
|
5.7 MB
|
Cryptography_ all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf
|
4.9 MB
|
COMPUTE!'s computer viruses.pdf
|
4.9 MB
|
Computer virus immunization.pdf
|
4.7 MB
|
I.T. IN PRACTICE_ Computer viruses.pdf
|
4.5 MB
|
Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 .pdf
|
4.5 MB
|
Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf
|
4.0 MB
|
Malicious crypto - (Ab)use cryptology.pdf
|
4.0 MB
|
Dynamical Models for Computer Viruses Propagation.pdf
|
4.0 MB
|
Malicious crypto.pdf
|
4.0 MB
|
Computer Viruses, Artificial Life and Evolution.pdf
|
4.0 MB
|
Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings.pdf
|
4.0 MB
|
Computer Viruses and Other Malicious Software_ A Threat to the Internet Economy.pdf
|
3.9 MB
|
Computer Viruses and the Simulation Environment WiCE.pdf
|
3.7 MB
|
Formal Models of Reproduction_ from Computer Viruses to Artificial Life.pdf
|
3.3 MB
|
Applied parallel coordinates for logs and network traffic attack analysis.pdf
|
3.1 MB
|
Defense and Detection Strategies against Internet Worms.pdf
|
3.0 MB
|
Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings.pdf
|
3.0 MB
|
A Framework for Deception.pdf
|
2.8 MB
|
Computer Viruses for Dummies.pdf
|
2.7 MB
|
In-depth analysis of the viral threats with OpenOf#ce.org documents.pdf
|
2.7 MB
|
Flying below the Radar_ What modern malware tells us.pdf
|
2.5 MB
|
A method to detect metamorphic computer viruses.pdf
|
2.5 MB
|
Computer viruses (BMJ 296-013).pdf
|
2.4 MB
|
Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf
|
2.3 MB
|
MCF_ a malicious code filter.pdf
|
2.3 MB
|
Peer-to-Peer Botnets_ Analysis and Detection.pdf
|
2.3 MB
|
Macro virus identification problems.pdf
|
2.2 MB
|
Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings.pdf
|
2.1 MB
|
Approaching Zero - The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals.pdf
|
2.1 MB
|
Classification and identification of malicious code based on heuristic techniques utilizing Meta languages.pdf
|
2.0 MB
|
Internet Instability and Disturbance_ Goal or Menace_.pdf
|
2.0 MB
|
Computer viruses_ from theory to applications.pdf
|
2.0 MB
|
On Callgraphs and Generative Mechanisms.pdf
|
1.9 MB
|
Malicious origami in PDF.pdf
|
1.9 MB
|
Automatic binary deobfuscation.pdf
|
1.9 MB
|
Comparative analysis of various ransomware virii.pdf
|
1.8 MB
|
Mechanics of Self-reproduction.pdf
|
1.8 MB
|
Impeding Malware Analysis Using Conditional Code Obfuscation.pdf
|
1.7 MB
|
Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf
|
1.6 MB
|
Experience with Viruses on UNIX Systems.pdf
|
1.5 MB
|
ACPI and SMI handlers_ some limits to trusted computing.pdf
|
1.5 MB
|
An Approach towards Disassembly of Malicious Binary Executables.pdf
|
1.5 MB
|
IPA Computer Virus Survey 2000.pdf
|
1.5 MB
|
Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses.pdf
|
1.5 MB
|
Darwin inside the machines_ Malware evolution and the consequences for computer security.pdf
|
1.4 MB
|
Automatic Reverse Engineering of Malware Emulators.pdf
|
1.4 MB
|
Computational Aspects of Computer Viruses.pdf
|
1.4 MB
|
Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf
|
1.4 MB
|
Computer Viruses - Theory and Experiments.pdf
|
1.4 MB
|
Detecting Unknown Computer Viruses.pdf
|
1.4 MB
|
A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf
|
1.4 MB
|
Detecting Viral Propagations Using Email Behavior Profiles.pdf
|
1.4 MB
|
A History Of Computer Viruses - The Famous `Trio'.pdf
|
1.4 MB
|
Notes on the _Worms_ programs -- some early experience with a distributed computation.pdf
|
1.3 MB
|
Polymorphic and Metamorphic Malware Detection.pdf
|
1.3 MB
|
Design of a neural network for recognition and classification of computer viruses.pdf
|
1.3 MB
|
Identification of file infecting viruses through detection of self-reference replication.pdf
|
1.3 MB
|
On Effectiveness of Defense Systems against Active Worms.pdf
|
1.3 MB
|
Defending against Viruses and Worms.pdf
|
1.2 MB
|
IpMorph_ fingerprinting spoofing unification.pdf
|
1.2 MB
|
Measuring and Modeling Computer Virus Prevalence.pdf
|
1.2 MB
|
Hunting for undetectable metamorphic viruses.pdf
|
1.2 MB
|
A Study of Malcode-Bearing Documents.pdf
|
1.2 MB
|
Cryptovirology_ Extortion-Based Security Threats and Countermeasures.pdf
|
1.2 MB
|
Crisis and Aftermath.pdf
|
1.2 MB
|
A Formal Definition of Computer Worms and Some Related Results.pdf
|
1.2 MB
|
Callgraph properties of executables.pdf
|
1.2 MB
|
Model for network behaviour under viral attack.pdf
|
1.1 MB
|
Disk-Level Behavioral Malware Detection.pdf
|
1.1 MB
|
Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf
|
1.1 MB
|
Detecting Sources of Computer Viruses in Networks_ Theory and Experiment.pdf
|
1.1 MB
|
ExaminingTаViruses.pdf
|
1.1 MB
|
Functional polymorphic engines_ formalisation, implementation and use cases.pdf
|
1.1 MB
|
Metamorphic Virus_ Analysis and Detection.pdf
|
1.1 MB
|
Can you be held civilly liable for spreading computer viruses_.pdf
|
1.1 MB
|
An Approach to Containing Computer Viruses.pdf
|
1.1 MB
|
A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed.pdf
|
1.1 MB
|
Implementation of a Computer Immune System for Intrusion- and Virus Detection.pdf
|
1.1 MB
|
Computer viruses demystified.pdf
|
1.0 MB
|
Non-signature based virus detection.pdf
|
1.0 MB
|
Hunting for Metamorphic Engines.pdf
|
1.0 MB
|
Computer Viruses and Ethics.pdf
|
1.0 MB
|
Development of inland lakes as hubs in an invasion network.pdf
|
995.4 KB
|
Metaphors and Modern Threats_ Biological, Computer, and Cognitive Viruses.pdf
|
985.4 KB
|
Are current antivirus programs able to detect complex metamorphic malware_ An empirical evaluation.pdf
|
963.6 KB
|
Free Anti-Virus Tips and Techniques.pdf
|
962.2 KB
|
Analysis and detection of metamorphic computer viruses.pdf
|
954.1 KB
|
Code obfuscation and virus detection.pdf
|
952.4 KB
|
Biological versus Computer Viruses.pdf
|
933.7 KB
|
Hunting For Metamorphic.pdf
|
923.6 KB
|
Malware behaviour analysis.pdf
|
920.9 KB
|
Anti-Malware Tools_ Intrusion Detection Systems.pdf
|
914.6 KB
|
Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf
|
910.8 KB
|
Panic computing_ The viral metaphor and computer technology.pdf
|
897.4 KB
|
Fileprint analysis for Malware Detection.pdf
|
870.5 KB
|
Concepts and Future Trends in Computer Virology.pdf
|
860.8 KB
|
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf
|
852.7 KB
|
Epidemiological Modelling of Peer-to-Peer Viruses and Pollution.pdf
|
847.5 KB
|
Computer Virus Operation and New Directions-1997.pdf
|
839.7 KB
|
Fragmented malware through RFID and its defenses.pdf
|
835.5 KB
|
Analysis of rxbot.pdf
|
835.4 KB
|
Honeypots against Worms 101.pdf
|
828.3 KB
|
A History Of Computer Viruses_ Three Special Viruses.pdf
|
809.0 KB
|
Modeling Malware Spreading Dynamics.pdf
|
808.9 KB
|
Detecting Kernel-Level Rootkits Through Binary Analysis.pdf
|
807.2 KB
|
Morphological Detection of Malware.pdf
|
805.5 KB
|
Hunting for metamorphic engines 2.pdf
|
805.5 KB
|
Architecture of a Morphological Malware Detector.pdf
|
805.5 KB
|
Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses v2.pdf
|
799.5 KB
|
Collaborative Defense Against Zero-Day and Polymorphic Worms_ Detection, Response and an Evaluation Framework.pdf
|
787.4 KB
|
Measuring virtual machine detection in malware using DSD tracer.pdf
|
782.2 KB
|
Computer virus prevention and containment on mainframes.pdf
|
781.4 KB
|
Code obfuscation techniques for metamorphic viruses.pdf
|
779.0 KB
|
IMAD_ In-Execution Malware Analysis and Detection.pdf
|
768.9 KB
|
A Short Visit to the Bot Zoo.pdf
|
760.0 KB
|
Immune System for Virus Detection and Elimination.pdf
|
757.5 KB
|
An Abstract Theory of Computer Viruses.pdf
|
747.0 KB
|
Code mutation techniques by means of formal grammars and automatons.pdf
|
746.9 KB
|
Computer Virus Propagation Model Based on Variable Propagation Rate.pdf
|
744.7 KB
|
Database Rootkits.pdf
|
738.3 KB
|
Computer _virus_ identification by neural networks.pdf
|
733.3 KB
|
A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS.pdf
|
732.6 KB
|
A Public Health Approach to Preventing Malware Propagation.pdf
|
725.3 KB
|
Know Your Enemy_ Containing Conficker.pdf
|
716.8 KB
|
Detecting Malicious Code by Model Checking.pdf
|
716.3 KB
|
A fault tolerance approach to computer viruses.pdf
|
696.1 KB
|
Botnetsand Applications.pdf
|
694.8 KB
|
Modeling the Effects of Timing Parameters on Virus Propagation.pdf
|
694.3 KB
|
New data mining technique to enhance IDS alarms quality.pdf
|
687.9 KB
|
Computer viruses (BMJ 307-59e).pdf
|
680.1 KB
|
A Proposed Taxonomy of Software Weapons.pdf
|
672.6 KB
|
Analysis and Detection of Computer Viruses and Worms.pdf
|
667.4 KB
|
Cobra_ Fine-grained Malware Analysis using Stealth Localized-executions.pdf
|
664.4 KB
|
Developing a Trojan applets in a smart card.pdf
|
655.1 KB
|
IDS alerts correlation using grammar-based approach.pdf
|
655.0 KB
|
Modeling the Spread of Active Worms.pdf
|
647.5 KB
|
Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf
|
645.7 KB
|
Computer Viruses_ The Technology and Evolution of an Artificial Life Form.pdf
|
644.9 KB
|
Automatic Extraction of Computer Virus Signatures.pdf
|
637.2 KB
|
Automated Web Patrol with Strider HoneyMonkeys_ Finding Web Sites That Exploit Browser Vulnerabilities.pdf
|
632.6 KB
|
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques.pdf
|
621.6 KB
|
Applications of Immune System Computing.pdf
|
620.7 KB
|
Characterization of virus replication.pdf
|
613.7 KB
|
Anti-Forensics_ The Rootkit Connection.pdf
|
610.8 KB
|
Modeling Computer Viruses.pdf
|
609.8 KB
|
Computer Viruses, Epidemiology, and Worms.pdf
|
609.1 KB
|
Distributed Worm Simulation with a Realistic Internet Model.pdf
|
607.1 KB
|
Distributed Computing with a Trojan Horse.pdf
|
604.3 KB
|
Analysis of Web Application Worms and Viruses.pdf
|
603.5 KB
|
Auto-Sign_ an automatic signature generator for high-speed malware filtering devices.pdf
|
600.0 KB
|
Computer Virus Operation and New Directions.pdf
|
596.5 KB
|
Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf
|
594.9 KB
|
Polymorphic virus detection technology.pdf
|
593.4 KB
|
Fast virus detection by using high speed time delay neural networks.pdf
|
592.9 KB
|
Abstraction-Based Intrusion Detection In Distributed Environments.pdf
|
590.6 KB
|
Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf
|
587.6 KB
|
Modeling Epidemic Spreading in Mobile Environments.pdf
|
587.2 KB
|
From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques.pdf
|
584.0 KB
|
Internet - Virusnet_.pdf
|
582.7 KB
|
End-to-end security implementation for mobile devices using TLS protocol.pdf
|
582.1 KB
|
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware.pdf
|
581.3 KB
|
Geometry-based flash worm detection.pdf
|
580.5 KB
|
Evolvable Malware.pdf
|
580.3 KB
|
A Generic Virus Detection Agent on the Internet.pdf
|
573.1 KB
|
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses.pdf
|
571.7 KB
|
Detecting metamorphic viruses using profile hidden markov models.pdf
|
560.7 KB
|
Automated Worm Fingerprinting.pdf
|
559.7 KB
|
Architecture of a morphological malware detector v2.pdf
|
549.7 KB
|
Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf
|
548.8 KB
|
Advanced Polymorphic Techniques.pdf
|
545.2 KB
|
Modeling Botnet Propagation Using Time Zones.pdf
|
541.1 KB
|
A Distributed Approach against Computer Viruses Inspired by the Immune System.pdf
|
521.0 KB
|
Advanced fuzzing in the VoIP space.pdf
|
515.8 KB
|
Ethereal,TаunTаanalyseurTаr+й seauTа+а usagesTаmultiples.pdf
|
511.3 KB
|
Malware Detection Based on Suspicious Behavior Identification.pdf
|
503.7 KB
|
E-mail virus protection handbook.pdf
|
503.7 KB
|
Automated Classification and Analysis of Internet Malware.pdf
|
500.7 KB
|
On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf
|
498.8 KB
|
Password Cracking_ A Game of Wits.pdf
|
488.0 KB
|
Malware, Viruses and Log Visualisation.pdf
|
485.6 KB
|
Combinatorial Optimisation of Worm Propagation on an Unknown Network.pdf
|
476.9 KB
|
PE-Miner_ Mining Structural Information to Detect Malicious Executables in Realtime.pdf
|
475.1 KB
|
Defeating Polymorphism_ Beyond Emulation.pdf
|
470.2 KB
|
EPOCalypse NOW!.pdf
|
466.9 KB
|
How Viruses Spread among Computers and People.pdf
|
462.6 KB
|
Computer Viruses_ the Inevitability of Evolution_.pdf
|
461.7 KB
|
A Virtual Honeypot Framework.pdf
|
461.6 KB
|
Computer Immunology.pdf
|
460.7 KB
|
How dumaru_.pdf
|
460.0 KB
|
Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf
|
458.5 KB
|
Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems.pdf
|
456.9 KB
|
Is virus writing really that bad_.pdf
|
456.1 KB
|
Improving Malware Detection by Applying Multi-Inducer Ensemble.pdf
|
452.3 KB
|
Computer Viruses, Epidemiology and Worms v2.pdf
|
450.6 KB
|
Efficient Virus Detection Using Dynamic Instruction Sequences.pdf
|
448.0 KB
|
Opcodes as Predictor for Malware.pdf
|
447.4 KB
|
On JavaScript Malware and related threats.pdf
|
446.6 KB
|
First Virus_.pdf
|
446.5 KB
|
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf
|
443.6 KB
|
A theoretical model of differential social attributions toward computing technology_ when the metaphor becomes the model.pdf
|
435.6 KB
|
Modern operating systems.pdf
|
435.2 KB
|
A bit of viral protection is worth a megabyte of cure.pdf
|
427.3 KB
|
Inside the Slammer Worm.pdf
|
424.6 KB
|
Attack of the quantum worms.pdf
|
419.5 KB
|
API Win32 ancestrales pour Chevaux de Troie hyper furtifs.pdf
|
417.8 KB
|
A general definition of malware.pdf
|
416.8 KB
|
An Overview of Unix Rootkits.pdf
|
412.9 KB
|
High-Fidelity Modeling of Computer Network Worms.pdf
|
410.1 KB
|
A Mathematical Theory for the Spread of Computer Viruses.pdf
|
409.7 KB
|
Computer Viruses By Ingrid Richter.pdf
|
408.2 KB
|
Analysis of a scanning model of worm propagation.pdf
|
407.0 KB
|
Hidden Rootkits in Windows.pdf
|
406.8 KB
|
Malicious Software in Mobile Devices.pdf
|
404.4 KB
|
ARTIST_ A Network for ARTifical Immune SysTems.pdf
|
400.2 KB
|
Loathing Lupper in Linux.pdf
|
398.7 KB
|
Mimimorphism_ A New Approach to Binary Code Obfuscation.pdf
|
396.2 KB
|
Malware pattern scanning schemes secure against black-box analysis.pdf
|
394.0 KB
|
Inoculating SSH Against Address-Harvesting Worms.pdf
|
389.4 KB
|
Formalisation and implementation aspects of K -ary (malicious) codes.pdf
|
389.4 KB
|
Metaphors And Meta-Experiences In Technology Side Effects_ A Multimedia Exhibit.pdf
|
389.2 KB
|
A software authentication system for the prevention of computer viruses.pdf
|
388.0 KB
|
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection.pdf
|
385.9 KB
|
A parallel _String Matching Engine_ for use in high speed network intrusion detection systems.pdf
|
383.7 KB
|
Implementing and Detecting an ACPI BIOS Rootkit.pdf
|
381.9 KB
|
A History Of Computer Viruses - Introduction.pdf
|
381.6 KB
|
On the possibility of practically obfuscating programs.pdf
|
381.5 KB
|
Computer viruses_ a quantitative analysis.pdf
|
381.2 KB
|
Danger theory and collaborative filtering in MANETs.pdf
|
381.1 KB
|
Misleading Modern Malware.pdf
|
378.4 KB
|
Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf
|
378.3 KB
|
Fighting EPO Viruses.pdf
|
377.4 KB
|
Malicious Software.pdf
|
368.6 KB
|
Email Virus Propagation Modeling and Analysis.pdf
|
367.2 KB
|
Detection of New Malicious Code Using N-grams Signatures.pdf
|
367.1 KB
|
Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf
|
365.9 KB
|
Effectiveness of Quarantine in Worm Epidemics.pdf
|
363.6 KB
|
Challenges Of Modeling BotNets For Military And Security Simulations.pdf
|
362.6 KB
|
Mathematical models on computer viruses.pdf
|
362.0 KB
|
Concepts of cooperation in artificial life.pdf
|
361.3 KB
|
Host-Based Detection of Worms through Peer-to-Peer Cooperation.pdf
|
360.4 KB
|
Old Win32 Code for a Modern Super-stealth Trojan.pdf
|
360.2 KB
|
Computer Viruses on the Loose.pdf
|
357.3 KB
|
Computer Virus Myths.pdf
|
355.6 KB
|
Control Flow to Detect Malware.pdf
|
353.1 KB
|
Introducing Stealth Malware Taxonomy.pdf
|
352.5 KB
|
A Semantics-Based Approach to Malware Detection.pdf
|
352.2 KB
|
Computer viruses (BMJ 299-66a).pdf
|
352.1 KB
|
A Retrovirus Inspired Algorithm for Virus Detection & Optimization.pdf
|
351.6 KB
|
Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf
|
351.4 KB
|
Are Metamorphic Viruses Really Invincible_.pdf
|
351.2 KB
|
Artificial Immune System against Viral Attack.pdf
|
350.4 KB
|
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations.pdf
|
345.8 KB
|
On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf
|
342.7 KB
|
Impact of Computer Viruses on Society.pdf
|
341.0 KB
|
Code-Red_ a case study on the spread and victims of an Internet worm.pdf
|
335.4 KB
|
Computer Immunology(Lau).pdf
|
335.3 KB
|
Detecting Stealth Software with Strider GhostBuster.pdf
|
331.3 KB
|
Formal Affordance-based Models of Computer Virus Reproduction.pdf
|
330.2 KB
|
A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows.pdf
|
327.7 KB
|
Model-Based Analysis of Two Fighting Worms.pdf
|
327.7 KB
|
Generic Detection and Classification of Polymorphic Malware Using Neural Pattern Recognition.pdf
|
325.7 KB
|
Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf
|
325.6 KB
|
On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf
|
320.0 KB
|
Malware Normalization.pdf
|
319.5 KB
|
Advanced Metamorphic Techniques in Computer Viruses.pdf
|
318.2 KB
|
A Framework to Detect Novel Computer Viruses via System Calls.pdf
|
318.1 KB
|
A Theoretical Superworm.pdf
|
317.9 KB
|
Computer Virus-Antivirus Coevolution.pdf
|
317.5 KB
|
Evaluation of malware phylogeny modelling systems using automated variant generation.pdf
|
316.4 KB
|
Detecting Worms through Cryptographic Hashes.pdf
|
315.8 KB
|
Anatomy of a Semantic Virus.pdf
|
313.2 KB
|
A Self-reproducing Analogue.pdf
|
311.8 KB
|
Imposing Order on Program Statements to Assist Anti-Virus Scanners.pdf
|
311.1 KB
|
Malware Detection using Statistical Analysis of Byte-Level File Content.pdf
|
311.0 KB
|
Backdoors et rootkits avanc+йs [SLIDES].pdf
|
309.2 KB
|
Computer viruses (BMJ 302-66e).pdf
|
308.9 KB
|
Malicious Codes in Depth.pdf
|
305.3 KB
|
Detecting Virus Mutations Via Dynamic Matching.pdf
|
304.8 KB
|
Des IDS et des vers... D+йtection par l'analyse statistique _ de la th+йorie +а la pratique _.pdf
|
301.6 KB
|
Pairwise alignment of metamorphic computer viruses.pdf
|
301.5 KB
|
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection.pdf
|
300.0 KB
|
MRSI A Fast Pattern Matching Algorithm for Anti-virus Applications.pdf
|
299.6 KB
|
Computer Virus Propagation Models.pdf
|
297.6 KB
|
Malware Research at SMU.pdf
|
295.7 KB
|
AGIS_ Towards Automatic Generation of Infection Signatures.pdf
|
294.9 KB
|
Anomalous Payload-based Network Intrusion Detection.pdf
|
291.5 KB
|
Conceptual Frameworks for Artificial Immune Systems.pdf
|
290.8 KB
|
A Potency Relation for Worms and Next-Generation Attack Tools.pdf
|
289.2 KB
|
Implica+зoes da ofusca+зao de c+¦digo no desenvolvimento de detectores de c+¦digo malicioso.pdf
|
289.1 KB
|
Countering Network Worms Through Automatic Patch Generation.pdf
|
288.0 KB
|
Anomalous Payload-based Worm Detection and Signature Generation.pdf
|
286.2 KB
|
Epidemic dynamics and endemic states in complex networks.pdf
|
286.1 KB
|
Epidemic Spreading in Real Networks_ An Eigenvalue Viewpoint.pdf
|
285.7 KB
|
A statistical model for undecidable viral detection.pdf
|
282.2 KB
|
Malware_ A Future Framework for Device, Network and Service Management.pdf
|
281.8 KB
|
Anti-Spyware Coalition Definitions and Supporting Documents.pdf
|
280.7 KB
|
A Sense of 'Danger' for Windows Processes.pdf
|
280.1 KB
|
A Survey of Cryptologic Issues in Computer Virology.pdf
|
277.4 KB
|
Development of Computer Vulnerability Scanning Scanning Workgroup.pdf
|
276.4 KB
|
Computer Viruses_ The Threat Today and The Expected Future.pdf
|
275.6 KB
|
HoneyStat_ Local Worm Detection Using Honeypots.pdf
|
272.9 KB
|
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.pdf
|
272.6 KB
|
Email networks and the spread of computer viruses.pdf
|
270.6 KB
|
An Architecture for Generating Semantic-Aware Signatures.pdf
|
269.4 KB
|
New thoughts in ring3 NT rootkit.pdf
|
266.7 KB
|
Parallels Between Biological and Computer Epidemics.pdf
|
266.3 KB
|
Extended recursion-based formalization of virus mutation.pdf
|
265.4 KB
|
Effectiveness of Rate Control in Slowing Down Worm Epidemics.pdf
|
265.1 KB
|
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior.pdf
|
263.1 KB
|
ELF et virologie informatique.pdf
|
263.1 KB
|
Malware Detection Using Adaptive Data Compression.pdf
|
263.1 KB
|
Convergence of Virus Writers and Hackers_ Fact or Fantasy_.pdf
|
261.5 KB
|
JAB, une backdoor pour reseau Win32 inconnu - Presentation SSTIC.pdf
|
260.9 KB
|
Immunization and epidemic dynamics in complex networks.pdf
|
259.1 KB
|
How to Kill Worms and Viruses with Policy Pontifications.pdf
|
258.6 KB
|
Comparing Passive and Active Worm Defenses.pdf
|
258.0 KB
|
Marginal Networks The Virus between Complexity and Suppression.pdf
|
257.8 KB
|
CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD_ VIRUSES AND COMPUTERS.pdf
|
256.6 KB
|
Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf
|
256.5 KB
|
Polymorphic Worm Detection Using Structural Information of Executables.pdf
|
255.9 KB
|
On the Performance of Internet Worm Scanning Strategies.pdf
|
254.7 KB
|
Hide'n'Seek_ Anatomy of Stealth Malware.pdf
|
254.3 KB
|
Anonymous and Malicious.pdf
|
254.2 KB
|
COMPUTER VIRUSES AND CIVIL LIABILITY_ A CONCEPTUAL FRAMEWORK.pdf
|
254.0 KB
|
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf
|
254.0 KB
|
Conflict and the Computer_ Information Warfare and Related Ethical Issues.pdf
|
253.9 KB
|
New malware distribution methods threaten signature-based AV.pdf
|
253.5 KB
|
Fast Detection of Scanning Worm Infections.pdf
|
252.9 KB
|
Combating computer viruses.pdf
|
251.9 KB
|
A Hybrid Model to Detect Malicious Executables.pdf
|
251.6 KB
|
Malware comes of age The arrival of the true computer parasite.pdf
|
249.5 KB
|
Design of a System for Real-Time Worm Detection.pdf
|
248.4 KB
|
Consensual Realities in Cyberspace.pdf
|
247.4 KB
|
Cheating the ELF Subversive Dynamic Linking to Libraries.pdf
|
245.9 KB
|
Adequacy of Checksum Algorithms for Computer Virus Detection.pdf
|
241.8 KB
|
Computer Viruses A Global Perspective.pdf
|
239.6 KB
|
Biologically Inspired Defenses Against Computer Viruses.pdf
|
239.5 KB
|
Modelling Development of Epidemics with Dynamic Small-World Networks.pdf
|
238.7 KB
|
Computer Viruses - Legal Options.pdf
|
238.5 KB
|
La _mobilit+й_ du code malveillant.pdf
|
238.4 KB
|
Antivirus update reaction times of major antivirus vendors.pdf
|
237.9 KB
|
Hunting for metamorphic 2.pdf
|
237.4 KB
|
Detecting Worms via Mining Dynamic Program Execution.pdf
|
236.6 KB
|
Computer Viruses_ Can It Happen At IU_.pdf
|
236.5 KB
|
A Feature Selection and Evaluation Scheme for Computer Virus Detection.pdf
|
235.4 KB
|
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf
|
235.3 KB
|
Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited_.pdf
|
234.8 KB
|
History of Viruses & Worms.pdf
|
234.4 KB
|
Advanced Routing Worm and Its Security Challenges.pdf
|
233.6 KB
|
A framework for modelling trojans and computer virus infection.pdf
|
233.2 KB
|
A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses.pdf
|
231.8 KB
|
Classification of Computer Viruses Using the Theory of Affordances.pdf
|
231.5 KB
|
Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf
|
230.2 KB
|
Computer viruses - the current state in Italy.pdf
|
230.0 KB
|
Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf
|
227.2 KB
|
Introduction to Network Self-defense_ technical and judicial issues.pdf
|
227.0 KB
|
Epidemics and immunization in scale-free networks.pdf
|
226.8 KB
|
Formalization of viruses and malware through process algebras.pdf
|
224.8 KB
|
Constructing Malware Normalizers using Term Rewriting.pdf
|
224.4 KB
|
Computer Viruses - A Form of Artificial Life .pdf
|
223.1 KB
|
On the Spread of Viruses on the Internet.pdf
|
222.9 KB
|
Comments on a paper by Voas, Payne & Cohen_ тАЬA model for detecting the existence of software corruption in real timeтАЭ.pdf
|
222.7 KB
|
How To Withstand Mobile Virus Attacks.pdf
|
222.6 KB
|
How to Withstand Mobile Virus Attacks 2.pdf
|
222.6 KB
|
Malware Phylogeny Generation using Permutations of Code.pdf
|
222.1 KB
|
N-gram analysis for computer virus detection.pdf
|
221.7 KB
|
Malware phylogeny generation using permutations of code 2.pdf
|
221.5 KB
|
Functional similarities between computer worms and biological pathogens.pdf
|
219.9 KB
|
Artificial Immune Systems and the Grand Challenge for Non-Classical Computation.pdf
|
218.3 KB
|
Beyond Layers and Peripheral Antivirus Security.pdf
|
218.0 KB
|
An Email Worm Vaccine Architecture.pdf
|
217.6 KB
|
Dynamic analysis of malicious code.pdf
|
217.5 KB
|
A Hygiene Lesson.pdf
|
217.3 KB
|
Learning to Detect Malicious Executables in the Wild.pdf
|
216.5 KB
|
Detecting Metamorphic Computer Viruses using Supercompilation.pdf
|
216.2 KB
|
Detection of metamorphic computer viruses using algebraic specification.pdf
|
216.0 KB
|
Models of Active Worm Defenses.pdf
|
215.3 KB
|
Attitude Adjustment_ Trojans and Malware on the Internet.pdf
|
212.0 KB
|
On the Time Complexity of Computer Viruses.pdf
|
210.6 KB
|
Computer viruses and electronic mail.pdf
|
209.2 KB
|
On abstract computer virology from a recursion-theoretic perspective.pdf
|
209.1 KB
|
Detecting worms through de-centralized monitoring.pdf
|
207.6 KB
|
As Japanese Bring Work Home, Virus Hitches a Ride.pdf
|
207.2 KB
|
Learning to Detect and Classify Malicious Executables in the Wild.pdf
|
206.7 KB
|
Effective and Inexpensive Methods Exist for Controlling Software Viruses.pdf
|
202.9 KB
|
An Introduction to Intrusion-Detection Systems.pdf
|
200.6 KB
|
Analyzing Worms and Network Traffic using Compression.pdf
|
200.2 KB
|
Classification of Packed Executables for Accurate Computer Virus Detection.pdf
|
199.8 KB
|
Monitoring and Early Warning for Internet Worms.pdf
|
199.5 KB
|
Inoculation strategies for victims of viruses and the sum-of-squares partition problem.pdf
|
199.5 KB
|
Is Your Cat Infected with a Computer Virus_.pdf
|
199.0 KB
|
Automated Defense from Rootkit Attacks.pdf
|
198.1 KB
|
A Trust System Based on Multi Level Virus Detection.pdf
|
197.6 KB
|
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf
|
196.0 KB
|
Computer Viruses_ The Disease, the Detection, and the Prescription for Protection Testimony.pdf
|
195.6 KB
|
Constructing Computer Virus Phylogenies.pdf
|
194.3 KB
|
An Efficient Control of Virus Propagation.pdf
|
193.1 KB
|
Do-It-Yourself Guide to Cell Phone Malware.pdf
|
192.9 KB
|
Countering Kernel Rootkits with Lightweight Hook Protection.pdf
|
192.9 KB
|
Detecting Windows Server Compromises with Patchfinder 2.pdf
|
191.4 KB
|
Exploiting an Antivirus Interface.pdf
|
191.4 KB
|
Autoimmune computer virus.pdf
|
191.2 KB
|
Autoimmune viruses.pdf
|
191.2 KB
|
Limits of Static Analysis for Malware Detection.pdf
|
189.4 KB
|
Broadband Network Virus Detection System Based on Bypass Monitor.pdf
|
187.1 KB
|
New threats of Java viruses.pdf
|
186.9 KB
|
A note on Cohen's formal model for computer viruses.pdf
|
186.9 KB
|
On Computer Viral Infection and the Effect of Immunization.pdf
|
184.1 KB
|
Covert Distributed Processing with Computer Viruses.pdf
|
183.8 KB
|
Evolution, Ecology and Optimization of Digital Organisms.pdf
|
183.7 KB
|
Bot Software Spreads, Causes New Worries.pdf
|
181.9 KB
|
On abstract computer virology from a recursion theoretic perspective 2.pdf
|
181.8 KB
|
High-Performance Context-Free Parser for Polymorphic Malware Detection.pdf
|
181.6 KB
|
Automated Malware Invariant Generation.pdf
|
180.1 KB
|
A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods.pdf
|
179.7 KB
|
Binary Obfuscation Using Signals.pdf
|
179.0 KB
|
How to assess the effectiveness of your anti-virus_.pdf
|
178.7 KB
|
Networks, Control, and Life-Forms.pdf
|
177.9 KB
|
Code Red Worm Propagation Modeling and Analysis.pdf
|
177.6 KB
|
Contagion and Repetition_ On the Viral Logic of Network Culture.pdf
|
177.3 KB
|
Efficient quarantining of scanning worms_ optimal detection and coordination.pdf
|
177.3 KB
|
DCA for Bot Detection.pdf
|
176.9 KB
|
Evaluation of Two Host-Based Intrusion Prevention Systems.pdf
|
175.2 KB
|
An Evaluation of Two Host Based Intrusion Prevention Systems.pdf
|
175.2 KB
|
Polygraph_ Automatically Generating Signatures for Polymorphic Worms.pdf
|
174.9 KB
|
Die Gefahr Von Debug Codes.pdf
|
173.5 KB
|
Malicious Cryptography_ Kleptographic Aspects.pdf
|
171.6 KB
|
A Memory Symptom-based Virus Detection Approach.pdf
|
171.4 KB
|
Open problems in computer virology.pdf
|
170.7 KB
|
FPGA Viruses.pdf
|
169.9 KB
|
Detecting Early Worm Propagation through Packet Matching.pdf
|
168.1 KB
|
On the Semantics of Self-Unpacking Malware Code.pdf
|
167.9 KB
|
A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf
|
167.8 KB
|
Abstract Detection of Computer Viruses.pdf
|
167.1 KB
|
MetaAware_ Identifying Metamorphic Malware.pdf
|
167.1 KB
|
A unified prediction of computer virus spread in connected networks.pdf
|
167.0 KB
|
Defending against Hitlist Worms using Network Address Space Randomization.pdf
|
166.7 KB
|
Algebraic Specification of Computer Viruses and Their Environments.pdf
|
166.2 KB
|
Infection, imitation and a hierarchy of computer viruses.pdf
|
165.8 KB
|
Normalizing Metamorphic Malware Using Term Rewriting.pdf
|
164.7 KB
|
Epidemic Profiles and Defense of Scale-Free Networks.pdf
|
164.5 KB
|
An OS Independent Heuristics-based Worm-containment System.pdf
|
163.3 KB
|
Control Flow Graphs as Malware Signatures.pdf
|
162.2 KB
|
Data Mining Methods for Detection of New Malicious Executables.pdf
|
161.7 KB
|
A Classification of Viruses through Recursion Theorems.pdf
|
160.9 KB
|
Computer Malware_ What You Don't Know Can Hurt You.pdf
|
160.6 KB
|
Efficiency of Trusted Platform Module Against Computer Attacks.pdf
|
160.4 KB
|
Defending Against Internet Worms_ A Signature-Based Approach.pdf
|
160.1 KB
|
Execution Context in Anti-Malware Testing.pdf
|
159.3 KB
|
CrT+ation d'un _Web Worm_.pdf
|
158.7 KB
|
Acquisition of Malicious Code Using Active Learning.pdf
|
158.2 KB
|
Infection dynamics on the Internet.pdf
|
157.7 KB
|
Cryptographic Hashing for Virus Localization.pdf
|
157.4 KB
|
Internet Quarantine_ Requirements for Containing Self-Propagating Code 2.pdf
|
157.0 KB
|
Internet Quarantine_ Requirements for Containing Self-Propagating Code.pdf
|
157.0 KB
|
Computer Viruses A Very Real Threat.pdf
|
156.0 KB
|
Magisterium Abraxas.pdf
|
155.5 KB
|
Digital Postmark Helps Fight Spam, Virus Attacks.pdf
|
154.5 KB
|
Countering NetworkWorms Through Automatic Patch Generation.pdf
|
153.4 KB
|
An epidemiological model of virus spread and cleanup.pdf
|
153.3 KB
|
Harmless and Useful Viruses Can Hardly Exist.pdf
|
153.3 KB
|
Network Worms.pdf
|
152.7 KB
|
A Web-Based Network Worm Simulator.pdf
|
148.3 KB
|
Applications of Genetic Algorithms to Malware Detection and Creation.pdf
|
147.9 KB
|
Computer viruses demystified,2.pdf
|
147.0 KB
|
Feedback Email Worm Defense System for Enterprise Networks.pdf
|
146.9 KB
|
Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance.pdf
|
146.2 KB
|
A study of anti-virus' response to unknown threats.pdf
|
145.9 KB
|
An Epidemiological View of Worms and Viruses.pdf
|
145.7 KB
|
Computers and epidemiology.pdf
|
145.7 KB
|
Automatic Static Unpacking of Malware Binaries.pdf
|
145.3 KB
|
Hash-AV_ Fast Virus Signature Scanning by Cache-Resident Filters.pdf
|
145.1 KB
|
Defense-In-Depth Against Computer Viruses.pdf
|
144.6 KB
|
Accurately Detecting Source Code of Attacks That Increase Privilege.pdf
|
142.4 KB
|
A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.pdf
|
142.4 KB
|
Implementing and testing a virus throttle.pdf
|
140.1 KB
|
Computer Worms_ Past, Present, and Future.pdf
|
139.7 KB
|
Internet computer virus protection policy.pdf
|
139.1 KB
|
Detecting Internet Worms Using Data Mining Techniques.pdf
|
138.8 KB
|
Biological Aspects of Computer Virology.pdf
|
138.7 KB
|
Blueprint for a Computer Immune System.pdf
|
136.7 KB
|
Malware in Popular Networks.pdf
|
136.4 KB
|
A Plague of Viruses_ Biological, Computer and Marketing.pdf
|
135.9 KB
|
Computer Viruses as Artificial Life.pdf
|
135.9 KB
|
Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures.pdf
|
134.7 KB
|
Danger! Deadly new computer viruses want to kill your PC.pdf
|
133.8 KB
|
Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf
|
132.9 KB
|
Fighting Computer Viruses.pdf
|
132.4 KB
|
Modeling Virus Propagation in Peer-to-Peer Networks.pdf
|
132.1 KB
|
Computer doctor busy fighting `viruses'.pdf
|
129.2 KB
|
Managing Computer Viruses in a Groupware Environment.pdf
|
127.3 KB
|
Benefits and Considerations for a Single-Vendor Antivirus Strategy.pdf
|
125.9 KB
|
Contournement d%92une passerelle antivirus.pdf
|
125.1 KB
|
Mind Wars_ Attack of the Memes.pdf
|
122.7 KB
|
On behavioral detection.pdf
|
122.2 KB
|
Console viruses_.pdf
|
121.9 KB
|
Contagion on the Internet.pdf
|
121.0 KB
|
On the definition and classification of cybercrime.pdf
|
120.1 KB
|
Are Handheld Viruses a Significant Threat_.pdf
|
119.8 KB
|
On the functional validity of the worm-killing worm.pdf
|
118.7 KB
|
Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf
|
118.1 KB
|
New method of fighting computer viruses announced.pdf
|
117.5 KB
|
Detection of Self-Mutating Computer Viruses.pdf
|
117.2 KB
|
Nematodes - Beneficial Worms.pdf
|
116.7 KB
|
Parallel analysis of polymorphic viral code using automated deduction system.pdf
|
115.5 KB
|
Linux Improvised Userland Scheduler Virus.pdf
|
115.1 KB
|
Mathematical Viruses.pdf
|
114.2 KB
|
Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware.pdf
|
113.6 KB
|
A Dozen Dangerous Myths About Computer Viruses.pdf
|
112.0 KB
|
BIRD_ Binary Interpretation using Runtime Disassembly.pdf
|
111.1 KB
|
Modular worms.pdf
|
110.5 KB
|
A Bypass of Cohen's Impossibility Result.pdf
|
109.3 KB
|
A Pact with the Devil.pdf
|
108.8 KB
|
Catch Me, If You Can_ Evading Network Signatures with Web-based Polymorphic Worms.pdf
|
108.7 KB
|
Epidemiological Models Applied to Viruses in Computer Networks.pdf
|
108.6 KB
|
Data security from malicious attack_ Computer Virus.pdf
|
108.5 KB
|
Avoiding Windows Rootkit Detection.pdf
|
108.1 KB
|
Finding Malware on Compromised Windows Machines.pdf
|
104.9 KB
|
Defense Against the Dark Arts.pdf
|
103.0 KB
|
A Taxonomy of Computer Worms.pdf
|
102.7 KB
|
Equational reasoning уВТчФиуБДуБЯ obfuscated decipher routine уБоуГСуГйуГбуГ-уВ¬цдЬхЗ¦.pdf
|
101.4 KB
|
Detecting self-mutating malware using control-flow graph matching.pdf
|
100.9 KB
|
Efficient Content-Based Detection of Zero-Day Worms.pdf
|
100.6 KB
|
Abstracts of Recent Articles and Literature.pdf
|
100.5 KB
|
Computer Viruses and What to Do About Them.pdf
|
99.3 KB
|
Computer Parasitology.pdf
|
99.1 KB
|
A Critical Look at the Regulation of Computer Viruses.pdf
|
98.6 KB
|
A Generic Virus Scanner in C++.pdf
|
98.4 KB
|
Cryptography and Viruses.pdf
|
98.3 KB
|
Faster parameter detection of polymorphic viral binary code using hot list strategy.pdf
|
97.7 KB
|
A Failure to Learn from the Past.pdf
|
97.0 KB
|
ASM-based Modelling of Self-Replicating Programs.pdf
|
95.0 KB
|
Computer virus prevention a primer.pdf
|
94.7 KB
|
Intrusion Detection for Viruses and Worms.pdf
|
94.0 KB
|
One-hit models for virus inactivation studies.pdf
|
93.7 KB
|
File system driver filtering against metamorphic viral coding.pdf
|
93.1 KB
|
Flexible Infections_ Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism.pdf
|
92.8 KB
|
Mathematical Model of Computer Viruses.pdf
|
92.4 KB
|
Computer virus cover withdrawn.pdf
|
92.3 KB
|
Generic Virus Scanner in C++.pdf
|
92.1 KB
|
Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection_.pdf
|
92.0 KB
|
From AntiVirus to AntiMalware Software and Beyond.pdf
|
92.0 KB
|
Anti-Virus in the Corporate Arena.pdf
|
91.8 KB
|
Future Trends in Malicious Code - 2006 Report.pdf
|
88.8 KB
|
Le malware en 2005 %96 Unix, Linux et autres plates-formes.pdf
|
87.8 KB
|
Computers under attacks!.pdf
|
87.0 KB
|
Painting the Internet_ A Different Kind of Warhol Worm.pdf
|
86.2 KB
|
N-gram-based Detection of New Malicious Code.pdf
|
85.6 KB
|
Immunity-Based Intrusion Detection System_ A General Framework.pdf
|
85.2 KB
|
Mobile Code Threats, Fact or Fiction.pdf
|
85.1 KB
|
Next-Generation Viruses Present New Challenges.pdf
|
85.0 KB
|
AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION.pdf
|
84.5 KB
|
An Internet-Worm Early Warning System.pdf
|
83.2 KB
|
Poison Ivy Farmers_ Virus Collections.pdf
|
81.9 KB
|
Attack of the killer virus!.pdf
|
80.8 KB
|
Computer Security Analysis through Decompilation and High-Level Debugging.pdf
|
80.8 KB
|
Malicious Threats to Personal Digital Assistants.pdf
|
80.6 KB
|
Computer Virus Strategies and Detection Methods.pdf
|
79.3 KB
|
Can cryptography prevent computer viruses_.pdf
|
78.6 KB
|
Information warfare and security.pdf
|
78.6 KB
|
Let free(dom) Ring!.pdf
|
78.1 KB
|
Computer Viruses as a Threat to Home Users.pdf
|
77.7 KB
|
JAB, une backdoor pour reseau Win32 inconnu.pdf
|
76.8 KB
|
A Cooperative Immunization System for an Untrusting Internet.pdf
|
76.4 KB
|
Becoming Positive.pdf
|
76.1 KB
|
Computer-Generated Life.pdf
|
76.0 KB
|
A pilot study on college student's attitudes toward computer virus.pdf
|
76.0 KB
|
Formal Definition of Self-reproductive Systems.pdf
|
75.4 KB
|
Malware analysis for windows administrators.pdf
|
74.4 KB
|
An Overview of Computer Viruses in a Research Environment.pdf
|
73.4 KB
|
ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETECTORS.pdf
|
73.4 KB
|
A Network Worm Vaccine Architecture.pdf
|
72.3 KB
|
A Tour of the Worm.pdf
|
72.2 KB
|
Information Assurance and the Information Society.pdf
|
71.0 KB
|
Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector.pdf
|
70.3 KB
|
Analysis of Virus Algorithms.pdf
|
70.2 KB
|
A Sense of Self for Unix Processes.pdf
|
69.8 KB
|
An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code.pdf
|
68.9 KB
|
A week is a long time in computer ethics.pdf
|
67.8 KB
|
A Worst-Case Worm.pdf
|
67.1 KB
|
I've named my virus - now what do I win_!.pdf
|
67.0 KB
|
Biological Models of Security for Virus Propagation in Computer Networks.pdf
|
66.4 KB
|
Malicious Data and Computer Security.pdf
|
65.5 KB
|
Ani-hilate this week.pdf
|
65.3 KB
|
Approaches to Integrated Malware Detection and Avoidance.pdf
|
63.4 KB
|
Impeding worm epidemics through destination address filtering.pdf
|
63.1 KB
|
$$$_+$$+$$__+_$+$$_$+$$$_+$$_$.pdf
|
60.3 KB
|
Do the macarena.pdf
|
59.4 KB
|
Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'.pdf
|
58.8 KB
|
Anti-Virus Product Evaluation in the Real World.pdf
|
58.4 KB
|
Infection dynamics on scale-free networks.pdf
|
58.2 KB
|
Computer intrusions and attacks.pdf
|
58.0 KB
|
Gatt got your tongue_.pdf
|
57.6 KB
|
Paradise lost.pdf
|
57.2 KB
|
COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT TECHNOLOGY.pdf
|
57.0 KB
|
I love you.pdf
|
56.8 KB
|
Flying solo.pdf
|
56.4 KB
|
Creating a Secure Computer Virus Laboratory.pdf
|
55.3 KB
|
Halting viruses in scale-free networks.pdf
|
55.2 KB
|
Antivirus Software Testing for the New Millenium.pdf
|
54.1 KB
|
Anti-Disassembly using Cryptographic Hash Functions.pdf
|
53.5 KB
|
Incorporating E-Commerce, Internet and Telecommunications Security.pdf
|
51.9 KB
|
Leaps and Bounds.pdf
|
51.7 KB
|
COMPUTER VIRUSES_ PREVENTION, DETECTION, AND TREATMENT.pdf
|
50.8 KB
|
It's a bird, it's a plane, it's Fooperman.pdf
|
50.8 KB
|
Implementing Anti-Virus Controls in the Corporate Arena.pdf
|
50.4 KB
|
An Epidemic Model of Mobile Phone Virus.pdf
|
49.8 KB
|
Hunting Obfuscated Malwares by Abstract Interpretation.pdf
|
49.1 KB
|
Deelaed learning.pdf
|
48.0 KB
|
Malware.pdf
|
47.8 KB
|
Hidan and dangerous.pdf
|
47.8 KB
|
Mostly harmless.pdf
|
46.7 KB
|
Doin' the eagle rock.pdf
|
46.2 KB
|
Computer Virus Identification and Prevention.pdf
|
45.5 KB
|
Crimea river.pdf
|
45.4 KB
|
Can you spare a seg_.pdf
|
45.0 KB
|
Bad Transfer.pdf
|
45.0 KB
|
Language, a virus_.pdf
|
44.8 KB
|
Are Computer Hacker Break-ins Ethical_.pdf
|
44.7 KB
|
Criss-cross.pdf
|
44.6 KB
|
Looking a Bagift-Horse in the Mouth.pdf
|
44.1 KB
|
Open Problems in Computer Virus Research.pdf
|
42.7 KB
|
Malicious Cryptography_ Cryptovirology and Kleptography.pdf
|
42.7 KB
|
Cain and Abul.pdf
|
42.4 KB
|
Got [Mac]root_.pdf
|
42.1 KB
|
Chamber of horrors.pdf
|
42.1 KB
|
Flibi night.pdf
|
41.5 KB
|
Not Teaching Viruses and Worms Is Harmful.pdf
|
40.9 KB
|
Attack of the Clones.pdf
|
40.2 KB
|
Making a hash of things.pdf
|
39.8 KB
|
Not worthy.pdf
|
39.2 KB
|
Look at that escargot.pdf
|
39.0 KB
|
An Introduction to Computer Viruses.pdf
|
38.8 KB
|
HIPAA and Information Security Policies.pdf
|
38.7 KB
|
Cabirn fever.pdf
|
37.5 KB
|
Computer abuse_ vandalizing the information society.pdf
|
36.7 KB
|
Heads or tails.pdf
|
36.5 KB
|
Challenges in getting 'formal' with viruses.pdf
|
35.0 KB
|
An Undetectable Computer Virus.pdf
|
33.7 KB
|
Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf
|
31.8 KB
|
Computer Viruses and Related Threats.pdf
|
31.3 KB
|
It's zell(d)ome the one you expect.pdf
|
31.0 KB
|
64-bit rugrats.pdf
|
31.0 KB
|
Blast off!.pdf
|
30.9 KB
|
COMPUTER VIRUS_ FUTURE CYBER WEAPONS.pdf
|
28.3 KB
|
Chiba witty blues.pdf
|
27.8 KB
|
Darwin, a Game of Survival of the Fittest among Programs.pdf
|
26.5 KB
|
Nimda Worm Shows You Can't Always Patch Fast Enough.pdf
|
25.1 KB
|
Computer Viruses_ A Management Perspective.pdf
|
24.1 KB
|
Let them eat brioche.pdf
|
23.6 KB
|
How the virus _Remote Shell Trojan_ (RST) works.pdf
|
21.2 KB
|
Corporate Virus Protection.pdf
|
20.7 KB
|
Computer Viruses and Their Control.pdf
|
19.4 KB
|
Do The Media Spread Computer Viruses.pdf
|
18.7 KB
|
Controlling Super-Intelligent Machines.pdf
|
17.9 KB
|
Computer Virus__.pdf
|
16.0 KB
|
A Computational Model of Computer Virus Propagation.pdf
|
14.8 KB
|
Iranian Journal Examines Electronic Warfare.pdf
|
12.4 KB
|
A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig.pdf
|
12.0 KB
|
Is creating virus software protected as a first amendment right_.pdf
|
11.9 KB
|
Computer Viruses Are Nothing New Don't be ashamed.pdf
|
10.5 KB
|
Killer Apps.pdf
|
10.5 KB
|
A Computer Virus Is A Thought Manifested.pdf
|
5.8 KB
|
GETTING THE WORD OUT.pdf
|
5.7 KB
|
Are computer viruses spread by the media_.pdf
|
4.0 KB
|
Total files 682
|