FileMood

Download Malware book collection 1

Malware book collection

Name

Malware book collection 1

 DOWNLOAD Copy Link

Total Size

655.1 MB

Total Files

682

Hash

06A7C92EB083DE573A50AC61434D4BEECF702309

/

Computer viruses - a high-tech desease.pdf

89.5 MB

Malicious Cryptography - Exposing Cryptovirology.pdf

30.5 MB

Malware Forensics Investigating and Analyzing Malicious Code.pdf

26.2 MB

Computer Virus Survival Guide.pdf

26.1 MB

Malware_ Von Viren, W+-rmern, Hackern und Trojanern und wie man sich vor ihnen sch+-tzt.pdf

22.6 MB

Les virus informatiques_ th+йorie, pratique et applications.pdf

20.5 MB

Malware Detection.pdf

19.4 MB

Detection of Intrusions and Malware, and Vulnerability Assessment 5th International Conference, DIMVA 2008 Paris, France, July 10-11, 2008 Proceedings.pdf

14.7 MB

Computer Viruses and Malware.pdf

11.3 MB

PC Magazine Fighting Spyware Viruses and Malware.pdf

10.9 MB

Crimeware_ Understanding New Attacks and Defenses.chm

10.8 MB

Malware Analyst's Cookbook and DVD.pdf

9.4 MB

Mobile Malware Attacks and Defense.pdf

7.1 MB

Malware_ Fighting Malicious Code.chm

6.7 MB

Identifying Malicious Code Through Reverse Engineering.pdf

6.5 MB

On self-reproducing computer programs.pdf

6.5 MB

Disk-Level Behavioral Virus Detection.pdf

5.7 MB

Cryptography_ all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf

4.9 MB

COMPUTE!'s computer viruses.pdf

4.9 MB

Computer virus immunization.pdf

4.7 MB

I.T. IN PRACTICE_ Computer viruses.pdf

4.5 MB

Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 .pdf

4.5 MB

Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf

4.0 MB

Malicious crypto - (Ab)use cryptology.pdf

4.0 MB

Dynamical Models for Computer Viruses Propagation.pdf

4.0 MB

Malicious crypto.pdf

4.0 MB

Computer Viruses, Artificial Life and Evolution.pdf

4.0 MB

Detection of Intrusions and Malware, and Vulnerability Assessment 6th International Conference, DIMVA 2009 Como, Italy, July 9-10, 2009 Proceedings.pdf

4.0 MB

Computer Viruses and Other Malicious Software_ A Threat to the Internet Economy.pdf

3.9 MB

Computer Viruses and the Simulation Environment WiCE.pdf

3.7 MB

Formal Models of Reproduction_ from Computer Viruses to Artificial Life.pdf

3.3 MB

Applied parallel coordinates for logs and network traffic attack analysis.pdf

3.1 MB

Defense and Detection Strategies against Internet Worms.pdf

3.0 MB

Detection of Intrusions and Malware & Vulnerability Assessment Third International Conference, DIMVA 2006 Berlin, Germany, July 13-14, 2006 Proceedings.pdf

3.0 MB

A Framework for Deception.pdf

2.8 MB

Computer Viruses for Dummies.pdf

2.7 MB

In-depth analysis of the viral threats with OpenOf#ce.org documents.pdf

2.7 MB

Flying below the Radar_ What modern malware tells us.pdf

2.5 MB

A method to detect metamorphic computer viruses.pdf

2.5 MB

Computer viruses (BMJ 296-013).pdf

2.4 MB

Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation.pdf

2.3 MB

MCF_ a malicious code filter.pdf

2.3 MB

Peer-to-Peer Botnets_ Analysis and Detection.pdf

2.3 MB

Macro virus identification problems.pdf

2.2 MB

Detection of Intrusions and Malware, and Vulnerability Assessment Second International Conference, DIMVA 2005 Vienna, Austria, July 7-8, 2005 Proceedings.pdf

2.1 MB

Approaching Zero - The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, And Keyboard Criminals.pdf

2.1 MB

Classification and identification of malicious code based on heuristic techniques utilizing Meta languages.pdf

2.0 MB

Internet Instability and Disturbance_ Goal or Menace_.pdf

2.0 MB

Computer viruses_ from theory to applications.pdf

2.0 MB

On Callgraphs and Generative Mechanisms.pdf

1.9 MB

Malicious origami in PDF.pdf

1.9 MB

Automatic binary deobfuscation.pdf

1.9 MB

Comparative analysis of various ransomware virii.pdf

1.8 MB

Mechanics of Self-reproduction.pdf

1.8 MB

Impeding Malware Analysis Using Conditional Code Obfuscation.pdf

1.7 MB

Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf

1.6 MB

Experience with Viruses on UNIX Systems.pdf

1.5 MB

ACPI and SMI handlers_ some limits to trusted computing.pdf

1.5 MB

An Approach towards Disassembly of Malicious Binary Executables.pdf

1.5 MB

IPA Computer Virus Survey 2000.pdf

1.5 MB

Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses.pdf

1.5 MB

Darwin inside the machines_ Malware evolution and the consequences for computer security.pdf

1.4 MB

Automatic Reverse Engineering of Malware Emulators.pdf

1.4 MB

Computational Aspects of Computer Viruses.pdf

1.4 MB

Morality and Technology, or Is it Wrong to Create and Let Loose a Computer Virus.pdf

1.4 MB

Computer Viruses - Theory and Experiments.pdf

1.4 MB

Detecting Unknown Computer Viruses.pdf

1.4 MB

A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf

1.4 MB

Detecting Viral Propagations Using Email Behavior Profiles.pdf

1.4 MB

A History Of Computer Viruses - The Famous `Trio'.pdf

1.4 MB

Notes on the _Worms_ programs -- some early experience with a distributed computation.pdf

1.3 MB

Polymorphic and Metamorphic Malware Detection.pdf

1.3 MB

Design of a neural network for recognition and classification of computer viruses.pdf

1.3 MB

Identification of file infecting viruses through detection of self-reference replication.pdf

1.3 MB

On Effectiveness of Defense Systems against Active Worms.pdf

1.3 MB

Defending against Viruses and Worms.pdf

1.2 MB

IpMorph_ fingerprinting spoofing unification.pdf

1.2 MB

Measuring and Modeling Computer Virus Prevalence.pdf

1.2 MB

Hunting for undetectable metamorphic viruses.pdf

1.2 MB

A Study of Malcode-Bearing Documents.pdf

1.2 MB

Cryptovirology_ Extortion-Based Security Threats and Countermeasures.pdf

1.2 MB

Crisis and Aftermath.pdf

1.2 MB

A Formal Definition of Computer Worms and Some Related Results.pdf

1.2 MB

Callgraph properties of executables.pdf

1.2 MB

Model for network behaviour under viral attack.pdf

1.1 MB

Disk-Level Behavioral Malware Detection.pdf

1.1 MB

Measurement and Analysis of Worm Propagation on Internet Network Topology.pdf

1.1 MB

Detecting Sources of Computer Viruses in Networks_ Theory and Experiment.pdf

1.1 MB

ExaminingTаViruses.pdf

1.1 MB

Functional polymorphic engines_ formalisation, implementation and use cases.pdf

1.1 MB

Metamorphic Virus_ Analysis and Detection.pdf

1.1 MB

Can you be held civilly liable for spreading computer viruses_.pdf

1.1 MB

An Approach to Containing Computer Viruses.pdf

1.1 MB

A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed.pdf

1.1 MB

Implementation of a Computer Immune System for Intrusion- and Virus Detection.pdf

1.1 MB

Computer viruses demystified.pdf

1.0 MB

Non-signature based virus detection.pdf

1.0 MB

Hunting for Metamorphic Engines.pdf

1.0 MB

Computer Viruses and Ethics.pdf

1.0 MB

Development of inland lakes as hubs in an invasion network.pdf

995.4 KB

Metaphors and Modern Threats_ Biological, Computer, and Cognitive Viruses.pdf

985.4 KB

Are current antivirus programs able to detect complex metamorphic malware_ An empirical evaluation.pdf

963.6 KB

Free Anti-Virus Tips and Techniques.pdf

962.2 KB

Analysis and detection of metamorphic computer viruses.pdf

954.1 KB

Code obfuscation and virus detection.pdf

952.4 KB

Biological versus Computer Viruses.pdf

933.7 KB

Hunting For Metamorphic.pdf

923.6 KB

Malware behaviour analysis.pdf

920.9 KB

Anti-Malware Tools_ Intrusion Detection Systems.pdf

914.6 KB

Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf

910.8 KB

Panic computing_ The viral metaphor and computer technology.pdf

897.4 KB

Fileprint analysis for Malware Detection.pdf

870.5 KB

Concepts and Future Trends in Computer Virology.pdf

860.8 KB

Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf

852.7 KB

Epidemiological Modelling of Peer-to-Peer Viruses and Pollution.pdf

847.5 KB

Computer Virus Operation and New Directions-1997.pdf

839.7 KB

Fragmented malware through RFID and its defenses.pdf

835.5 KB

Analysis of rxbot.pdf

835.4 KB

Honeypots against Worms 101.pdf

828.3 KB

A History Of Computer Viruses_ Three Special Viruses.pdf

809.0 KB

Modeling Malware Spreading Dynamics.pdf

808.9 KB

Detecting Kernel-Level Rootkits Through Binary Analysis.pdf

807.2 KB

Morphological Detection of Malware.pdf

805.5 KB

Hunting for metamorphic engines 2.pdf

805.5 KB

Architecture of a Morphological Malware Detector.pdf

805.5 KB

Blended attacks exploits, vulnerabilities and buffer-overflow techniques in computer viruses v2.pdf

799.5 KB

Collaborative Defense Against Zero-Day and Polymorphic Worms_ Detection, Response and an Evaluation Framework.pdf

787.4 KB

Measuring virtual machine detection in malware using DSD tracer.pdf

782.2 KB

Computer virus prevention and containment on mainframes.pdf

781.4 KB

Code obfuscation techniques for metamorphic viruses.pdf

779.0 KB

IMAD_ In-Execution Malware Analysis and Detection.pdf

768.9 KB

A Short Visit to the Bot Zoo.pdf

760.0 KB

Immune System for Virus Detection and Elimination.pdf

757.5 KB

An Abstract Theory of Computer Viruses.pdf

747.0 KB

Code mutation techniques by means of formal grammars and automatons.pdf

746.9 KB

Computer Virus Propagation Model Based on Variable Propagation Rate.pdf

744.7 KB

Database Rootkits.pdf

738.3 KB

Computer _virus_ identification by neural networks.pdf

733.3 KB

A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS.pdf

732.6 KB

A Public Health Approach to Preventing Malware Propagation.pdf

725.3 KB

Know Your Enemy_ Containing Conficker.pdf

716.8 KB

Detecting Malicious Code by Model Checking.pdf

716.3 KB

A fault tolerance approach to computer viruses.pdf

696.1 KB

Botnetsand Applications.pdf

694.8 KB

Modeling the Effects of Timing Parameters on Virus Propagation.pdf

694.3 KB

New data mining technique to enhance IDS alarms quality.pdf

687.9 KB

Computer viruses (BMJ 307-59e).pdf

680.1 KB

A Proposed Taxonomy of Software Weapons.pdf

672.6 KB

Analysis and Detection of Computer Viruses and Worms.pdf

667.4 KB

Cobra_ Fine-grained Malware Analysis using Stealth Localized-executions.pdf

664.4 KB

Developing a Trojan applets in a smart card.pdf

655.1 KB

IDS alerts correlation using grammar-based approach.pdf

655.0 KB

Modeling the Spread of Active Worms.pdf

647.5 KB

Malware Detection using Attribute-Automata to parse Abstract Behavioral Descriptions.pdf

645.7 KB

Computer Viruses_ The Technology and Evolution of an Artificial Life Form.pdf

644.9 KB

Automatic Extraction of Computer Virus Signatures.pdf

637.2 KB

Automated Web Patrol with Strider HoneyMonkeys_ Finding Web Sites That Exploit Browser Vulnerabilities.pdf

632.6 KB

An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques.pdf

621.6 KB

Applications of Immune System Computing.pdf

620.7 KB

Characterization of virus replication.pdf

613.7 KB

Anti-Forensics_ The Rootkit Connection.pdf

610.8 KB

Modeling Computer Viruses.pdf

609.8 KB

Computer Viruses, Epidemiology, and Worms.pdf

609.1 KB

Distributed Worm Simulation with a Realistic Internet Model.pdf

607.1 KB

Distributed Computing with a Trojan Horse.pdf

604.3 KB

Analysis of Web Application Worms and Viruses.pdf

603.5 KB

Auto-Sign_ an automatic signature generator for high-speed malware filtering devices.pdf

600.0 KB

Computer Virus Operation and New Directions.pdf

596.5 KB

Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf

594.9 KB

Polymorphic virus detection technology.pdf

593.4 KB

Fast virus detection by using high speed time delay neural networks.pdf

592.9 KB

Abstraction-Based Intrusion Detection In Distributed Environments.pdf

590.6 KB

Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdf

587.6 KB

Modeling Epidemic Spreading in Mobile Environments.pdf

587.2 KB

From the design of a generic metamorphic engine to a black-box classification of antivirus detection techniques.pdf

584.0 KB

Internet - Virusnet_.pdf

582.7 KB

End-to-end security implementation for mobile devices using TLS protocol.pdf

582.1 KB

Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware.pdf

581.3 KB

Geometry-based flash worm detection.pdf

580.5 KB

Evolvable Malware.pdf

580.3 KB

A Generic Virus Detection Agent on the Internet.pdf

573.1 KB

Implications of Peer-to-Peer Networks on Worm Attacks and Defenses.pdf

571.7 KB

Detecting metamorphic viruses using profile hidden markov models.pdf

560.7 KB

Automated Worm Fingerprinting.pdf

559.7 KB

Architecture of a morphological malware detector v2.pdf

549.7 KB

Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf

548.8 KB

Advanced Polymorphic Techniques.pdf

545.2 KB

Modeling Botnet Propagation Using Time Zones.pdf

541.1 KB

A Distributed Approach against Computer Viruses Inspired by the Immune System.pdf

521.0 KB

Advanced fuzzing in the VoIP space.pdf

515.8 KB

Ethereal,TаunTаanalyseurTаr+й seauTа+а usagesTаmultiples.pdf

511.3 KB

Malware Detection Based on Suspicious Behavior Identification.pdf

503.7 KB

E-mail virus protection handbook.pdf

503.7 KB

Automated Classification and Analysis of Internet Malware.pdf

500.7 KB

On the trade-off between speed and resiliency of Flash worms and similar malcodes.pdf

498.8 KB

Password Cracking_ A Game of Wits.pdf

488.0 KB

Malware, Viruses and Log Visualisation.pdf

485.6 KB

Combinatorial Optimisation of Worm Propagation on an Unknown Network.pdf

476.9 KB

PE-Miner_ Mining Structural Information to Detect Malicious Executables in Realtime.pdf

475.1 KB

Defeating Polymorphism_ Beyond Emulation.pdf

470.2 KB

EPOCalypse NOW!.pdf

466.9 KB

How Viruses Spread among Computers and People.pdf

462.6 KB

Computer Viruses_ the Inevitability of Evolution_.pdf

461.7 KB

A Virtual Honeypot Framework.pdf

461.6 KB

Computer Immunology.pdf

460.7 KB

How dumaru_.pdf

460.0 KB

Network Virus Propagation Model Based on Effects of Removing Time and User Vigilance.pdf

458.5 KB

Kolmogorov Complexity Estimates For Detection Of Viruses In Biologically Inspired Security Systems.pdf

456.9 KB

Is virus writing really that bad_.pdf

456.1 KB

Improving Malware Detection by Applying Multi-Inducer Ensemble.pdf

452.3 KB

Computer Viruses, Epidemiology and Worms v2.pdf

450.6 KB

Efficient Virus Detection Using Dynamic Instruction Sequences.pdf

448.0 KB

Opcodes as Predictor for Malware.pdf

447.4 KB

On JavaScript Malware and related threats.pdf

446.6 KB

First Virus_.pdf

446.5 KB

Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction.pdf

443.6 KB

A theoretical model of differential social attributions toward computing technology_ when the metaphor becomes the model.pdf

435.6 KB

Modern operating systems.pdf

435.2 KB

A bit of viral protection is worth a megabyte of cure.pdf

427.3 KB

Inside the Slammer Worm.pdf

424.6 KB

Attack of the quantum worms.pdf

419.5 KB

API Win32 ancestrales pour Chevaux de Troie hyper furtifs.pdf

417.8 KB

A general definition of malware.pdf

416.8 KB

An Overview of Unix Rootkits.pdf

412.9 KB

High-Fidelity Modeling of Computer Network Worms.pdf

410.1 KB

A Mathematical Theory for the Spread of Computer Viruses.pdf

409.7 KB

Computer Viruses By Ingrid Richter.pdf

408.2 KB

Analysis of a scanning model of worm propagation.pdf

407.0 KB

Hidden Rootkits in Windows.pdf

406.8 KB

Malicious Software in Mobile Devices.pdf

404.4 KB

ARTIST_ A Network for ARTifical Immune SysTems.pdf

400.2 KB

Loathing Lupper in Linux.pdf

398.7 KB

Mimimorphism_ A New Approach to Binary Code Obfuscation.pdf

396.2 KB

Malware pattern scanning schemes secure against black-box analysis.pdf

394.0 KB

Inoculating SSH Against Address-Harvesting Worms.pdf

389.4 KB

Formalisation and implementation aspects of K -ary (malicious) codes.pdf

389.4 KB

Metaphors And Meta-Experiences In Technology Side Effects_ A Multimedia Exhibit.pdf

389.2 KB

A software authentication system for the prevention of computer viruses.pdf

388.0 KB

Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection.pdf

385.9 KB

A parallel _String Matching Engine_ for use in high speed network intrusion detection systems.pdf

383.7 KB

Implementing and Detecting an ACPI BIOS Rootkit.pdf

381.9 KB

A History Of Computer Viruses - Introduction.pdf

381.6 KB

On the possibility of practically obfuscating programs.pdf

381.5 KB

Computer viruses_ a quantitative analysis.pdf

381.2 KB

Danger theory and collaborative filtering in MANETs.pdf

381.1 KB

Misleading Modern Malware.pdf

378.4 KB

Metamorphism, Formal Grammars and Undecidable Code Mutation.pdf

378.3 KB

Fighting EPO Viruses.pdf

377.4 KB

Malicious Software.pdf

368.6 KB

Email Virus Propagation Modeling and Analysis.pdf

367.2 KB

Detection of New Malicious Code Using N-grams Signatures.pdf

367.1 KB

Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf

365.9 KB

Effectiveness of Quarantine in Worm Epidemics.pdf

363.6 KB

Challenges Of Modeling BotNets For Military And Security Simulations.pdf

362.6 KB

Mathematical models on computer viruses.pdf

362.0 KB

Concepts of cooperation in artificial life.pdf

361.3 KB

Host-Based Detection of Worms through Peer-to-Peer Cooperation.pdf

360.4 KB

Old Win32 Code for a Modern Super-stealth Trojan.pdf

360.2 KB

Computer Viruses on the Loose.pdf

357.3 KB

Computer Virus Myths.pdf

355.6 KB

Control Flow to Detect Malware.pdf

353.1 KB

Introducing Stealth Malware Taxonomy.pdf

352.5 KB

A Semantics-Based Approach to Malware Detection.pdf

352.2 KB

Computer viruses (BMJ 299-66a).pdf

352.1 KB

A Retrovirus Inspired Algorithm for Virus Detection & Optimization.pdf

351.6 KB

Dynamic Binary Instrumentation-based Framework for Malware Defense.pdf

351.4 KB

Are Metamorphic Viruses Really Invincible_.pdf

351.2 KB

Artificial Immune System against Viral Attack.pdf

350.4 KB

A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations.pdf

345.8 KB

On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection.pdf

342.7 KB

Impact of Computer Viruses on Society.pdf

341.0 KB

Code-Red_ a case study on the spread and victims of an Internet worm.pdf

335.4 KB

Computer Immunology(Lau).pdf

335.3 KB

Detecting Stealth Software with Strider GhostBuster.pdf

331.3 KB

Formal Affordance-based Models of Computer Virus Reproduction.pdf

330.2 KB

A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows.pdf

327.7 KB

Model-Based Analysis of Two Fighting Worms.pdf

327.7 KB

Generic Detection and Classification of Polymorphic Malware Using Neural Pattern Recognition.pdf

325.7 KB

Detecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf

325.6 KB

On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf

320.0 KB

Malware Normalization.pdf

319.5 KB

Advanced Metamorphic Techniques in Computer Viruses.pdf

318.2 KB

A Framework to Detect Novel Computer Viruses via System Calls.pdf

318.1 KB

A Theoretical Superworm.pdf

317.9 KB

Computer Virus-Antivirus Coevolution.pdf

317.5 KB

Evaluation of malware phylogeny modelling systems using automated variant generation.pdf

316.4 KB

Detecting Worms through Cryptographic Hashes.pdf

315.8 KB

Anatomy of a Semantic Virus.pdf

313.2 KB

A Self-reproducing Analogue.pdf

311.8 KB

Imposing Order on Program Statements to Assist Anti-Virus Scanners.pdf

311.1 KB

Malware Detection using Statistical Analysis of Byte-Level File Content.pdf

311.0 KB

Backdoors et rootkits avanc+йs [SLIDES].pdf

309.2 KB

Computer viruses (BMJ 302-66e).pdf

308.9 KB

Malicious Codes in Depth.pdf

305.3 KB

Detecting Virus Mutations Via Dynamic Matching.pdf

304.8 KB

Des IDS et des vers... D+йtection par l'analyse statistique _ de la th+йorie +а la pratique _.pdf

301.6 KB

Pairwise alignment of metamorphic computer viruses.pdf

301.5 KB

Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection.pdf

300.0 KB

MRSI A Fast Pattern Matching Algorithm for Anti-virus Applications.pdf

299.6 KB

Computer Virus Propagation Models.pdf

297.6 KB

Malware Research at SMU.pdf

295.7 KB

AGIS_ Towards Automatic Generation of Infection Signatures.pdf

294.9 KB

Anomalous Payload-based Network Intrusion Detection.pdf

291.5 KB

Conceptual Frameworks for Artificial Immune Systems.pdf

290.8 KB

A Potency Relation for Worms and Next-Generation Attack Tools.pdf

289.2 KB

Implica+зoes da ofusca+зao de c+¦digo no desenvolvimento de detectores de c+¦digo malicioso.pdf

289.1 KB

Countering Network Worms Through Automatic Patch Generation.pdf

288.0 KB

Anomalous Payload-based Worm Detection and Signature Generation.pdf

286.2 KB

Epidemic dynamics and endemic states in complex networks.pdf

286.1 KB

Epidemic Spreading in Real Networks_ An Eigenvalue Viewpoint.pdf

285.7 KB

A statistical model for undecidable viral detection.pdf

282.2 KB

Malware_ A Future Framework for Device, Network and Service Management.pdf

281.8 KB

Anti-Spyware Coalition Definitions and Supporting Documents.pdf

280.7 KB

A Sense of 'Danger' for Windows Processes.pdf

280.1 KB

A Survey of Cryptologic Issues in Computer Virology.pdf

277.4 KB

Development of Computer Vulnerability Scanning Scanning Workgroup.pdf

276.4 KB

Computer Viruses_ The Threat Today and The Expected Future.pdf

275.6 KB

HoneyStat_ Local Worm Detection Using Honeypots.pdf

272.9 KB

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.pdf

272.6 KB

Email networks and the spread of computer viruses.pdf

270.6 KB

An Architecture for Generating Semantic-Aware Signatures.pdf

269.4 KB

New thoughts in ring3 NT rootkit.pdf

266.7 KB

Parallels Between Biological and Computer Epidemics.pdf

266.3 KB

Extended recursion-based formalization of virus mutation.pdf

265.4 KB

Effectiveness of Rate Control in Slowing Down Worm Epidemics.pdf

265.1 KB

Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior.pdf

263.1 KB

ELF et virologie informatique.pdf

263.1 KB

Malware Detection Using Adaptive Data Compression.pdf

263.1 KB

Convergence of Virus Writers and Hackers_ Fact or Fantasy_.pdf

261.5 KB

JAB, une backdoor pour reseau Win32 inconnu - Presentation SSTIC.pdf

260.9 KB

Immunization and epidemic dynamics in complex networks.pdf

259.1 KB

How to Kill Worms and Viruses with Policy Pontifications.pdf

258.6 KB

Comparing Passive and Active Worm Defenses.pdf

258.0 KB

Marginal Networks The Virus between Complexity and Suppression.pdf

257.8 KB

CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD_ VIRUSES AND COMPUTERS.pdf

256.6 KB

Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf

256.5 KB

Polymorphic Worm Detection Using Structural Information of Executables.pdf

255.9 KB

On the Performance of Internet Worm Scanning Strategies.pdf

254.7 KB

Hide'n'Seek_ Anatomy of Stealth Malware.pdf

254.3 KB

Anonymous and Malicious.pdf

254.2 KB

COMPUTER VIRUSES AND CIVIL LIABILITY_ A CONCEPTUAL FRAMEWORK.pdf

254.0 KB

Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf

254.0 KB

Conflict and the Computer_ Information Warfare and Related Ethical Issues.pdf

253.9 KB

New malware distribution methods threaten signature-based AV.pdf

253.5 KB

Fast Detection of Scanning Worm Infections.pdf

252.9 KB

Combating computer viruses.pdf

251.9 KB

A Hybrid Model to Detect Malicious Executables.pdf

251.6 KB

Malware comes of age The arrival of the true computer parasite.pdf

249.5 KB

Design of a System for Real-Time Worm Detection.pdf

248.4 KB

Consensual Realities in Cyberspace.pdf

247.4 KB

Cheating the ELF Subversive Dynamic Linking to Libraries.pdf

245.9 KB

Adequacy of Checksum Algorithms for Computer Virus Detection.pdf

241.8 KB

Computer Viruses A Global Perspective.pdf

239.6 KB

Biologically Inspired Defenses Against Computer Viruses.pdf

239.5 KB

Modelling Development of Epidemics with Dynamic Small-World Networks.pdf

238.7 KB

Computer Viruses - Legal Options.pdf

238.5 KB

La _mobilit+й_ du code malveillant.pdf

238.4 KB

Antivirus update reaction times of major antivirus vendors.pdf

237.9 KB

Hunting for metamorphic 2.pdf

237.4 KB

Detecting Worms via Mining Dynamic Program Execution.pdf

236.6 KB

Computer Viruses_ Can It Happen At IU_.pdf

236.5 KB

A Feature Selection and Evaluation Scheme for Computer Virus Detection.pdf

235.4 KB

Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf

235.3 KB

Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited_.pdf

234.8 KB

History of Viruses & Worms.pdf

234.4 KB

Advanced Routing Worm and Its Security Challenges.pdf

233.6 KB

A framework for modelling trojans and computer virus infection.pdf

233.2 KB

A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses.pdf

231.8 KB

Classification of Computer Viruses Using the Theory of Affordances.pdf

231.5 KB

Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf

230.2 KB

Computer viruses - the current state in Italy.pdf

230.0 KB

Detection of Metamorphic and Virtualization-based Malware using Algebraic Specification.pdf

227.2 KB

Introduction to Network Self-defense_ technical and judicial issues.pdf

227.0 KB

Epidemics and immunization in scale-free networks.pdf

226.8 KB

Formalization of viruses and malware through process algebras.pdf

224.8 KB

Constructing Malware Normalizers using Term Rewriting.pdf

224.4 KB

Computer Viruses - A Form of Artificial Life .pdf

223.1 KB

On the Spread of Viruses on the Internet.pdf

222.9 KB

Comments on a paper by Voas, Payne & Cohen_ тАЬA model for detecting the existence of software corruption in real timeтАЭ.pdf

222.7 KB

How To Withstand Mobile Virus Attacks.pdf

222.6 KB

How to Withstand Mobile Virus Attacks 2.pdf

222.6 KB

Malware Phylogeny Generation using Permutations of Code.pdf

222.1 KB

N-gram analysis for computer virus detection.pdf

221.7 KB

Malware phylogeny generation using permutations of code 2.pdf

221.5 KB

Functional similarities between computer worms and biological pathogens.pdf

219.9 KB

Artificial Immune Systems and the Grand Challenge for Non-Classical Computation.pdf

218.3 KB

Beyond Layers and Peripheral Antivirus Security.pdf

218.0 KB

An Email Worm Vaccine Architecture.pdf

217.6 KB

Dynamic analysis of malicious code.pdf

217.5 KB

A Hygiene Lesson.pdf

217.3 KB

Learning to Detect Malicious Executables in the Wild.pdf

216.5 KB

Detecting Metamorphic Computer Viruses using Supercompilation.pdf

216.2 KB

Detection of metamorphic computer viruses using algebraic specification.pdf

216.0 KB

Models of Active Worm Defenses.pdf

215.3 KB

Attitude Adjustment_ Trojans and Malware on the Internet.pdf

212.0 KB

On the Time Complexity of Computer Viruses.pdf

210.6 KB

Computer viruses and electronic mail.pdf

209.2 KB

On abstract computer virology from a recursion-theoretic perspective.pdf

209.1 KB

Detecting worms through de-centralized monitoring.pdf

207.6 KB

As Japanese Bring Work Home, Virus Hitches a Ride.pdf

207.2 KB

Learning to Detect and Classify Malicious Executables in the Wild.pdf

206.7 KB

Effective and Inexpensive Methods Exist for Controlling Software Viruses.pdf

202.9 KB

An Introduction to Intrusion-Detection Systems.pdf

200.6 KB

Analyzing Worms and Network Traffic using Compression.pdf

200.2 KB

Classification of Packed Executables for Accurate Computer Virus Detection.pdf

199.8 KB

Monitoring and Early Warning for Internet Worms.pdf

199.5 KB

Inoculation strategies for victims of viruses and the sum-of-squares partition problem.pdf

199.5 KB

Is Your Cat Infected with a Computer Virus_.pdf

199.0 KB

Automated Defense from Rootkit Attacks.pdf

198.1 KB

A Trust System Based on Multi Level Virus Detection.pdf

197.6 KB

On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf

196.0 KB

Computer Viruses_ The Disease, the Detection, and the Prescription for Protection Testimony.pdf

195.6 KB

Constructing Computer Virus Phylogenies.pdf

194.3 KB

An Efficient Control of Virus Propagation.pdf

193.1 KB

Do-It-Yourself Guide to Cell Phone Malware.pdf

192.9 KB

Countering Kernel Rootkits with Lightweight Hook Protection.pdf

192.9 KB

Detecting Windows Server Compromises with Patchfinder 2.pdf

191.4 KB

Exploiting an Antivirus Interface.pdf

191.4 KB

Autoimmune computer virus.pdf

191.2 KB

Autoimmune viruses.pdf

191.2 KB

Limits of Static Analysis for Malware Detection.pdf

189.4 KB

Broadband Network Virus Detection System Based on Bypass Monitor.pdf

187.1 KB

New threats of Java viruses.pdf

186.9 KB

A note on Cohen's formal model for computer viruses.pdf

186.9 KB

On Computer Viral Infection and the Effect of Immunization.pdf

184.1 KB

Covert Distributed Processing with Computer Viruses.pdf

183.8 KB

Evolution, Ecology and Optimization of Digital Organisms.pdf

183.7 KB

Bot Software Spreads, Causes New Worries.pdf

181.9 KB

On abstract computer virology from a recursion theoretic perspective 2.pdf

181.8 KB

High-Performance Context-Free Parser for Polymorphic Malware Detection.pdf

181.6 KB

Automated Malware Invariant Generation.pdf

180.1 KB

A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods.pdf

179.7 KB

Binary Obfuscation Using Signals.pdf

179.0 KB

How to assess the effectiveness of your anti-virus_.pdf

178.7 KB

Networks, Control, and Life-Forms.pdf

177.9 KB

Code Red Worm Propagation Modeling and Analysis.pdf

177.6 KB

Contagion and Repetition_ On the Viral Logic of Network Culture.pdf

177.3 KB

Efficient quarantining of scanning worms_ optimal detection and coordination.pdf

177.3 KB

DCA for Bot Detection.pdf

176.9 KB

Evaluation of Two Host-Based Intrusion Prevention Systems.pdf

175.2 KB

An Evaluation of Two Host Based Intrusion Prevention Systems.pdf

175.2 KB

Polygraph_ Automatically Generating Signatures for Polymorphic Worms.pdf

174.9 KB

Die Gefahr Von Debug Codes.pdf

173.5 KB

Malicious Cryptography_ Kleptographic Aspects.pdf

171.6 KB

A Memory Symptom-based Virus Detection Approach.pdf

171.4 KB

Open problems in computer virology.pdf

170.7 KB

FPGA Viruses.pdf

169.9 KB

Detecting Early Worm Propagation through Packet Matching.pdf

168.1 KB

On the Semantics of Self-Unpacking Malware Code.pdf

167.9 KB

A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf

167.8 KB

Abstract Detection of Computer Viruses.pdf

167.1 KB

MetaAware_ Identifying Metamorphic Malware.pdf

167.1 KB

A unified prediction of computer virus spread in connected networks.pdf

167.0 KB

Defending against Hitlist Worms using Network Address Space Randomization.pdf

166.7 KB

Algebraic Specification of Computer Viruses and Their Environments.pdf

166.2 KB

Infection, imitation and a hierarchy of computer viruses.pdf

165.8 KB

Normalizing Metamorphic Malware Using Term Rewriting.pdf

164.7 KB

Epidemic Profiles and Defense of Scale-Free Networks.pdf

164.5 KB

An OS Independent Heuristics-based Worm-containment System.pdf

163.3 KB

Control Flow Graphs as Malware Signatures.pdf

162.2 KB

Data Mining Methods for Detection of New Malicious Executables.pdf

161.7 KB

A Classification of Viruses through Recursion Theorems.pdf

160.9 KB

Computer Malware_ What You Don't Know Can Hurt You.pdf

160.6 KB

Efficiency of Trusted Platform Module Against Computer Attacks.pdf

160.4 KB

Defending Against Internet Worms_ A Signature-Based Approach.pdf

160.1 KB

Execution Context in Anti-Malware Testing.pdf

159.3 KB

CrT+ation d'un _Web Worm_.pdf

158.7 KB

Acquisition of Malicious Code Using Active Learning.pdf

158.2 KB

Infection dynamics on the Internet.pdf

157.7 KB

Cryptographic Hashing for Virus Localization.pdf

157.4 KB

Internet Quarantine_ Requirements for Containing Self-Propagating Code 2.pdf

157.0 KB

Internet Quarantine_ Requirements for Containing Self-Propagating Code.pdf

157.0 KB

Computer Viruses A Very Real Threat.pdf

156.0 KB

Magisterium Abraxas.pdf

155.5 KB

Digital Postmark Helps Fight Spam, Virus Attacks.pdf

154.5 KB

Countering NetworkWorms Through Automatic Patch Generation.pdf

153.4 KB

An epidemiological model of virus spread and cleanup.pdf

153.3 KB

Harmless and Useful Viruses Can Hardly Exist.pdf

153.3 KB

Network Worms.pdf

152.7 KB

A Web-Based Network Worm Simulator.pdf

148.3 KB

Applications of Genetic Algorithms to Malware Detection and Creation.pdf

147.9 KB

Computer viruses demystified,2.pdf

147.0 KB

Feedback Email Worm Defense System for Enterprise Networks.pdf

146.9 KB

Cooperative Automated worm Response and Detection ImmuNe ALgorithm(CARDINAL) inspired by T-cell Immunity and Tolerance.pdf

146.2 KB

A study of anti-virus' response to unknown threats.pdf

145.9 KB

An Epidemiological View of Worms and Viruses.pdf

145.7 KB

Computers and epidemiology.pdf

145.7 KB

Automatic Static Unpacking of Malware Binaries.pdf

145.3 KB

Hash-AV_ Fast Virus Signature Scanning by Cache-Resident Filters.pdf

145.1 KB

Defense-In-Depth Against Computer Viruses.pdf

144.6 KB

Accurately Detecting Source Code of Attacks That Increase Privilege.pdf

142.4 KB

A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.pdf

142.4 KB

Implementing and testing a virus throttle.pdf

140.1 KB

Computer Worms_ Past, Present, and Future.pdf

139.7 KB

Internet computer virus protection policy.pdf

139.1 KB

Detecting Internet Worms Using Data Mining Techniques.pdf

138.8 KB

Biological Aspects of Computer Virology.pdf

138.7 KB

Blueprint for a Computer Immune System.pdf

136.7 KB

Malware in Popular Networks.pdf

136.4 KB

A Plague of Viruses_ Biological, Computer and Marketing.pdf

135.9 KB

Computer Viruses as Artificial Life.pdf

135.9 KB

Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures.pdf

134.7 KB

Danger! Deadly new computer viruses want to kill your PC.pdf

133.8 KB

Modern Methods of Detecting and Eradicating Known and Unknown Viruses.pdf

132.9 KB

Fighting Computer Viruses.pdf

132.4 KB

Modeling Virus Propagation in Peer-to-Peer Networks.pdf

132.1 KB

Computer doctor busy fighting `viruses'.pdf

129.2 KB

Managing Computer Viruses in a Groupware Environment.pdf

127.3 KB

Benefits and Considerations for a Single-Vendor Antivirus Strategy.pdf

125.9 KB

Contournement d%92une passerelle antivirus.pdf

125.1 KB

Mind Wars_ Attack of the Memes.pdf

122.7 KB

On behavioral detection.pdf

122.2 KB

Console viruses_.pdf

121.9 KB

Contagion on the Internet.pdf

121.0 KB

On the definition and classification of cybercrime.pdf

120.1 KB

Are Handheld Viruses a Significant Threat_.pdf

119.8 KB

On the functional validity of the worm-killing worm.pdf

118.7 KB

Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure.pdf

118.1 KB

New method of fighting computer viruses announced.pdf

117.5 KB

Detection of Self-Mutating Computer Viruses.pdf

117.2 KB

Nematodes - Beneficial Worms.pdf

116.7 KB

Parallel analysis of polymorphic viral code using automated deduction system.pdf

115.5 KB

Linux Improvised Userland Scheduler Virus.pdf

115.1 KB

Mathematical Viruses.pdf

114.2 KB

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware.pdf

113.6 KB

A Dozen Dangerous Myths About Computer Viruses.pdf

112.0 KB

BIRD_ Binary Interpretation using Runtime Disassembly.pdf

111.1 KB

Modular worms.pdf

110.5 KB

A Bypass of Cohen's Impossibility Result.pdf

109.3 KB

A Pact with the Devil.pdf

108.8 KB

Catch Me, If You Can_ Evading Network Signatures with Web-based Polymorphic Worms.pdf

108.7 KB

Epidemiological Models Applied to Viruses in Computer Networks.pdf

108.6 KB

Data security from malicious attack_ Computer Virus.pdf

108.5 KB

Avoiding Windows Rootkit Detection.pdf

108.1 KB

Finding Malware on Compromised Windows Machines.pdf

104.9 KB

Defense Against the Dark Arts.pdf

103.0 KB

A Taxonomy of Computer Worms.pdf

102.7 KB

Equational reasoning уВТчФиуБДуБЯ obfuscated decipher routine уБоуГСуГйуГбуГ-уВ¬цдЬхЗ¦.pdf

101.4 KB

Detecting self-mutating malware using control-flow graph matching.pdf

100.9 KB

Efficient Content-Based Detection of Zero-Day Worms.pdf

100.6 KB

Abstracts of Recent Articles and Literature.pdf

100.5 KB

Computer Viruses and What to Do About Them.pdf

99.3 KB

Computer Parasitology.pdf

99.1 KB

A Critical Look at the Regulation of Computer Viruses.pdf

98.6 KB

A Generic Virus Scanner in C++.pdf

98.4 KB

Cryptography and Viruses.pdf

98.3 KB

Faster parameter detection of polymorphic viral binary code using hot list strategy.pdf

97.7 KB

A Failure to Learn from the Past.pdf

97.0 KB

ASM-based Modelling of Self-Replicating Programs.pdf

95.0 KB

Computer virus prevention a primer.pdf

94.7 KB

Intrusion Detection for Viruses and Worms.pdf

94.0 KB

One-hit models for virus inactivation studies.pdf

93.7 KB

File system driver filtering against metamorphic viral coding.pdf

93.1 KB

Flexible Infections_ Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism.pdf

92.8 KB

Mathematical Model of Computer Viruses.pdf

92.4 KB

Computer virus cover withdrawn.pdf

92.3 KB

Generic Virus Scanner in C++.pdf

92.1 KB

Are Evolutionary Rule Learning Algorithms Appropriate for Malware Detection_.pdf

92.0 KB

From AntiVirus to AntiMalware Software and Beyond.pdf

92.0 KB

Anti-Virus in the Corporate Arena.pdf

91.8 KB

Future Trends in Malicious Code - 2006 Report.pdf

88.8 KB

Le malware en 2005 %96 Unix, Linux et autres plates-formes.pdf

87.8 KB

Computers under attacks!.pdf

87.0 KB

Painting the Internet_ A Different Kind of Warhol Worm.pdf

86.2 KB

N-gram-based Detection of New Malicious Code.pdf

85.6 KB

Immunity-Based Intrusion Detection System_ A General Framework.pdf

85.2 KB

Mobile Code Threats, Fact or Fiction.pdf

85.1 KB

Next-Generation Viruses Present New Challenges.pdf

85.0 KB

AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION.pdf

84.5 KB

An Internet-Worm Early Warning System.pdf

83.2 KB

Poison Ivy Farmers_ Virus Collections.pdf

81.9 KB

Attack of the killer virus!.pdf

80.8 KB

Computer Security Analysis through Decompilation and High-Level Debugging.pdf

80.8 KB

Malicious Threats to Personal Digital Assistants.pdf

80.6 KB

Computer Virus Strategies and Detection Methods.pdf

79.3 KB

Can cryptography prevent computer viruses_.pdf

78.6 KB

Information warfare and security.pdf

78.6 KB

Let free(dom) Ring!.pdf

78.1 KB

Computer Viruses as a Threat to Home Users.pdf

77.7 KB

JAB, une backdoor pour reseau Win32 inconnu.pdf

76.8 KB

A Cooperative Immunization System for an Untrusting Internet.pdf

76.4 KB

Becoming Positive.pdf

76.1 KB

Computer-Generated Life.pdf

76.0 KB

A pilot study on college student's attitudes toward computer virus.pdf

76.0 KB

Formal Definition of Self-reproductive Systems.pdf

75.4 KB

Malware analysis for windows administrators.pdf

74.4 KB

An Overview of Computer Viruses in a Research Environment.pdf

73.4 KB

ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETECTORS.pdf

73.4 KB

A Network Worm Vaccine Architecture.pdf

72.3 KB

A Tour of the Worm.pdf

72.2 KB

Information Assurance and the Information Society.pdf

71.0 KB

Design of an Artificial Immune System as a Novel Anomaly Detector for Combating Financial Fraud in the Retail Sector.pdf

70.3 KB

Analysis of Virus Algorithms.pdf

70.2 KB

A Sense of Self for Unix Processes.pdf

69.8 KB

An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code.pdf

68.9 KB

A week is a long time in computer ethics.pdf

67.8 KB

A Worst-Case Worm.pdf

67.1 KB

I've named my virus - now what do I win_!.pdf

67.0 KB

Biological Models of Security for Virus Propagation in Computer Networks.pdf

66.4 KB

Malicious Data and Computer Security.pdf

65.5 KB

Ani-hilate this week.pdf

65.3 KB

Approaches to Integrated Malware Detection and Avoidance.pdf

63.4 KB

Impeding worm epidemics through destination address filtering.pdf

63.1 KB

$$$_+$$+$$__+_$+$$_$+$$$_+$$_$.pdf

60.3 KB

Do the macarena.pdf

59.4 KB

Comment on 'A Framework for Modelling Trojans and Computer Virus Infection'.pdf

58.8 KB

Anti-Virus Product Evaluation in the Real World.pdf

58.4 KB

Infection dynamics on scale-free networks.pdf

58.2 KB

Computer intrusions and attacks.pdf

58.0 KB

Gatt got your tongue_.pdf

57.6 KB

Paradise lost.pdf

57.2 KB

COMPUTER VIRUS RESPONSE USING AUTONOMOUS AGENT TECHNOLOGY.pdf

57.0 KB

I love you.pdf

56.8 KB

Flying solo.pdf

56.4 KB

Creating a Secure Computer Virus Laboratory.pdf

55.3 KB

Halting viruses in scale-free networks.pdf

55.2 KB

Antivirus Software Testing for the New Millenium.pdf

54.1 KB

Anti-Disassembly using Cryptographic Hash Functions.pdf

53.5 KB

Incorporating E-Commerce, Internet and Telecommunications Security.pdf

51.9 KB

Leaps and Bounds.pdf

51.7 KB

COMPUTER VIRUSES_ PREVENTION, DETECTION, AND TREATMENT.pdf

50.8 KB

It's a bird, it's a plane, it's Fooperman.pdf

50.8 KB

Implementing Anti-Virus Controls in the Corporate Arena.pdf

50.4 KB

An Epidemic Model of Mobile Phone Virus.pdf

49.8 KB

Hunting Obfuscated Malwares by Abstract Interpretation.pdf

49.1 KB

Deelaed learning.pdf

48.0 KB

Malware.pdf

47.8 KB

Hidan and dangerous.pdf

47.8 KB

Mostly harmless.pdf

46.7 KB

Doin' the eagle rock.pdf

46.2 KB

Computer Virus Identification and Prevention.pdf

45.5 KB

Crimea river.pdf

45.4 KB

Can you spare a seg_.pdf

45.0 KB

Bad Transfer.pdf

45.0 KB

Language, a virus_.pdf

44.8 KB

Are Computer Hacker Break-ins Ethical_.pdf

44.7 KB

Criss-cross.pdf

44.6 KB

Looking a Bagift-Horse in the Mouth.pdf

44.1 KB

Open Problems in Computer Virus Research.pdf

42.7 KB

Malicious Cryptography_ Cryptovirology and Kleptography.pdf

42.7 KB

Cain and Abul.pdf

42.4 KB

Got [Mac]root_.pdf

42.1 KB

Chamber of horrors.pdf

42.1 KB

Flibi night.pdf

41.5 KB

Not Teaching Viruses and Worms Is Harmful.pdf

40.9 KB

Attack of the Clones.pdf

40.2 KB

Making a hash of things.pdf

39.8 KB

Not worthy.pdf

39.2 KB

Look at that escargot.pdf

39.0 KB

An Introduction to Computer Viruses.pdf

38.8 KB

HIPAA and Information Security Policies.pdf

38.7 KB

Cabirn fever.pdf

37.5 KB

Computer abuse_ vandalizing the information society.pdf

36.7 KB

Heads or tails.pdf

36.5 KB

Challenges in getting 'formal' with viruses.pdf

35.0 KB

An Undetectable Computer Virus.pdf

33.7 KB

Obfuscated dechiper routine analysis using theorem prover towards effective trusted computing.pdf

31.8 KB

Computer Viruses and Related Threats.pdf

31.3 KB

It's zell(d)ome the one you expect.pdf

31.0 KB

64-bit rugrats.pdf

31.0 KB

Blast off!.pdf

30.9 KB

COMPUTER VIRUS_ FUTURE CYBER WEAPONS.pdf

28.3 KB

Chiba witty blues.pdf

27.8 KB

Darwin, a Game of Survival of the Fittest among Programs.pdf

26.5 KB

Nimda Worm Shows You Can't Always Patch Fast Enough.pdf

25.1 KB

Computer Viruses_ A Management Perspective.pdf

24.1 KB

Let them eat brioche.pdf

23.6 KB

How the virus _Remote Shell Trojan_ (RST) works.pdf

21.2 KB

Corporate Virus Protection.pdf

20.7 KB

Computer Viruses and Their Control.pdf

19.4 KB

Do The Media Spread Computer Viruses.pdf

18.7 KB

Controlling Super-Intelligent Machines.pdf

17.9 KB

Computer Virus__.pdf

16.0 KB

A Computational Model of Computer Virus Propagation.pdf

14.8 KB

Iranian Journal Examines Electronic Warfare.pdf

12.4 KB

A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig.pdf

12.0 KB

Is creating virus software protected as a first amendment right_.pdf

11.9 KB

Computer Viruses Are Nothing New Don't be ashamed.pdf

10.5 KB

Killer Apps.pdf

10.5 KB

A Computer Virus Is A Thought Manifested.pdf

5.8 KB

GETTING THE WORD OUT.pdf

5.7 KB

Are computer viruses spread by the media_.pdf

4.0 KB

 

Total files 682


Copyright © 2024 FileMood.com