/
|
Viruses Revealed Understanding and Counter Malicious Software.pdf
|
52.4 MB
|
Techniques virales avanc%2b%aees.pdf
|
19.1 MB
|
The Art of Computer Virus Research and Defense.pdf
|
10.4 MB
|
The Dangers of Computer Viruses Implications for 21st Century Educators.pdf
|
9.5 MB
|
The Giant Black Book of Computer Viruses.pdf
|
6.0 MB
|
WORM AND VIRUS DEFENSE HOW CAN WE PROTECT THE NATION'S COMPUTERS FROM THESE THREATS.pdf
|
5.9 MB
|
Virus Tutorial.pdf
|
2.9 MB
|
The worm that turned A social use of computer viruses.pdf
|
2.8 MB
|
The Internet Worm Program An Analysis.pdf
|
2.5 MB
|
Using Plant Epidemiological Methods To Track Computer Network Worms.pdf
|
2.4 MB
|
Virus als Metapher.pdf
|
2.4 MB
|
Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics.pdf
|
1.9 MB
|
The Use of Heuristics in Identifying Self-Propagating Malicious Mobile Code.pdf
|
1.9 MB
|
Trojan White Paper.pdf
|
1.9 MB
|
The Giant Black Book of Computer Viruses (2nd ed.).pdf
|
1.8 MB
|
The Rise of AutoRunBased Malware.pdf
|
1.8 MB
|
Technological Turf Wars A Case Study of the Computer Antivirus Industry.pdf
|
1.8 MB
|
The Pathology of Computer Viruses.pdf
|
1.5 MB
|
The Shockwave Rider.pdf
|
1.5 MB
|
The Little Black Book of Computer Viruses.pdf
|
1.5 MB
|
Technologically Enabled Crime Shifting Paradigms for the Year 2000.pdf
|
1.4 MB
|
Testing Time for Antivirus Software.pdf
|
1.4 MB
|
Trojans Worms and Spyware A Computer Security Professional's Guide to Malicious Code.pdf
|
1.4 MB
|
Viruses and Worms--What Can You Do.pdf
|
1.3 MB
|
The Role of Internet Service Providers in Botnet Mitigation An Empirical Analysis Based on Spam Data.pdf
|
1.2 MB
|
With Microscope and Tweezers The Worm from MITS Perspective.pdf
|
1.2 MB
|
Unknown Malcode Detection and the Imbalance Problem.pdf
|
1.2 MB
|
The Internet Worm Crisis and Aftermath.pdf
|
1.2 MB
|
The Art of File Format Fuzzing.pdf
|
1.2 MB
|
Using Virtualisation to Protect Against Zero-Day Attacks.pdf
|
1.2 MB
|
Viruses, Worms, Zombies, and other Beasties.pdf
|
1.1 MB
|
Towards an undetectable computer virus.pdf
|
1.1 MB
|
The Emergence of the Posthuman Consumer and the Fusion of the Virtual and the Real.pdf
|
1.1 MB
|
The Worm Programs--Early Experience with a Distributed Intelligence.pdf
|
946.8 KB
|
The Worm Programs - Early Experience with a Distributed Computation.pdf
|
890.8 KB
|
Towards Stealthy Malware Detection.pdf
|
882.1 KB
|
The Blaster Worm - The View from 10,000 feet.pdf
|
850.0 KB
|
Threat Intelligence Gathering, Malware Collection and Incident Response Proposal Discover, Investigate and Report.pdf
|
829.9 KB
|
The geneology of malware.pdf
|
803.9 KB
|
Understanding Computer Viruses.pdf
|
798.0 KB
|
Viruses and Criminal Law.pdf
|
746.8 KB
|
Testing the SETIHacker Hypothesis.pdf
|
688.9 KB
|
Viral Attacks On UNIX System Security.pdf
|
685.5 KB
|
The SASSER Event History and Implications.pdf
|
668.8 KB
|
The Internet Motion Sensor A Distributed Blackhole Monitoring System.pdf
|
661.2 KB
|
USC-OIA Special Virus Report.pdf
|
658.0 KB
|
Viral Bodies, Virtual Practices.pdf
|
647.3 KB
|
VT Integrity Services for Networking.pdf
|
622.4 KB
|
The impact of Microsoft Windows infection vectors on IP network traffic patterns.pdf
|
607.7 KB
|
The Application of Epidemiology to Computer Viruses.pdf
|
602.8 KB
|
The Impact of Countermeasure Propagation on the Prevalence of Computer Viruses.pdf
|
594.7 KB
|
Virus Detection System - VDS.pdf
|
588.8 KB
|
Using Predators to Combat Worms and Viruses A Simulation-Based Study.pdf
|
585.8 KB
|
System Dynamic Model for Computer Virus Prevalance.pdf
|
583.4 KB
|
The Father Christmas worm.pdf
|
583.3 KB
|
Virus ex machina res ipsa loquitur.pdf
|
581.3 KB
|
Virus Prevention Without Signatures.pdf
|
543.8 KB
|
Visualizing Windows Executable Viruses Using Self-Organizing Maps.pdf
|
543.8 KB
|
TIBS.pdf
|
527.9 KB
|
Using Spatio-Temporal Information in API Calls with Machine Learning Algorithms for Malware Detection.pdf
|
525.8 KB
|
The Latest Malware Threats Against Your PC.pdf
|
523.2 KB
|
When Malware Meets Rootkits.pdf
|
505.1 KB
|
Utilizing Entropy to Identify Undetected Malware.pdf
|
502.5 KB
|
Taxonomy and Effectiveness of Worm Defense Strategies.pdf
|
499.6 KB
|
Using Entropy Analysis to Find Encrypted and Packed Malware.pdf
|
478.0 KB
|
VirusMeter Preventing Your Cellphone from Spies.pdf
|
473.6 KB
|
The Costly Implications of Consulting in a Virus-Infected Computer Environment.pdf
|
468.7 KB
|
Worm wars.pdf
|
457.6 KB
|
Virus Spread in Networks.pdf
|
446.7 KB
|
Unknown Computer Virus Detection Inspired by Immunity.pdf
|
439.9 KB
|
The WiT virus A virus built on the ViT ELF virus.pdf
|
429.2 KB
|
Tools for Finding and Removing Rootkits.pdf
|
428.4 KB
|
Viruses and Worms The Inside Story.pdf
|
424.0 KB
|
The Cornell Commission On Morris and the Worm.pdf
|
413.3 KB
|
Virus Techniques.pdf
|
411.5 KB
|
Zeroing in on Metamorphic Computer Viruses.pdf
|
411.2 KB
|
The Norman Book on Computer Viruses.pdf
|
397.3 KB
|
Using Formal Grammar and Genetic Operators to Evolve Malware.pdf
|
397.3 KB
|
Worm Hotspots Explaining Non-Uniformity in Worm Targeting Behavior.pdf
|
392.0 KB
|
polyunpack.pdf
|
381.0 KB
|
Worm Detection Using Local Networks.pdf
|
380.4 KB
|
TTAnalyze A Tool for Analyzing Malware.pdf
|
379.8 KB
|
Taking the redpill Artificial Evolution in native x86 systems.pdf
|
379.2 KB
|
Virus Writers 360.pdf
|
377.5 KB
|
Using Support Vector Machine to Detect Unknown Computer Viruses.pdf
|
367.3 KB
|
Virology_101(Usenix).pdf
|
367.3 KB
|
Worm Epidemiology.pdf
|
360.4 KB
|
Viruses Bottleneck Prosecution.pdf
|
357.3 KB
|
Virus Scanners for Multiple OSes.pdf
|
356.4 KB
|
Testing Malware Detectors.pdf
|
347.2 KB
|
The Impact of Computer Viruses on Society.pdf
|
341.0 KB
|
Two Bills Equal Forewarning.pdf
|
330.3 KB
|
The Virtual Artaud Computer Virus as Performance Art.pdf
|
328.5 KB
|
Use of an Attenuated Computer Virus as a Mechanism for Teaching Epidemiology.pdf
|
327.3 KB
|
Worm Analysis through Computer Simulation.pdf
|
325.2 KB
|
Towards Systematic Evaluation of the Evadability of Bot,Botnet Detection Methods.pdf
|
321.9 KB
|
Viruses and Worms.pdf
|
318.8 KB
|
White-box attack context cryptovirology.pdf
|
308.2 KB
|
Worm Meets Beehive.pdf
|
305.2 KB
|
Virus detection using datamining techniques.pdf
|
303.9 KB
|
Treating scalability and modelling human countermeasures against local preference worms via gradient models.pdf
|
297.0 KB
|
Turing Machines and Undecidability with Special Focus on Computer Viruses.pdf
|
290.7 KB
|
Virii Generators Understanding the Threat.pdf
|
288.6 KB
|
Taiwan's first ever political computer virus.pdf
|
288.1 KB
|
Viruses and Worms The Best Defense is Awareness.pdf
|
283.9 KB
|
Worm Anatomy and Model.pdf
|
273.6 KB
|
The Basic Building Blocks of Malware.pdf
|
273.2 KB
|
Using Engine Signature to Detect Metamorphic Malware.pdf
|
272.4 KB
|
User-mode memory scanning on 32-bit & 64-bit windows.pdf
|
268.4 KB
|
Ukrainian-Russian Hackers the Stealth Group and Its Leader, LovinGOD.pdf
|
262.6 KB
|
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense.pdf
|
259.4 KB
|
Testing and evaluating virus detectors for handheld devices.pdf
|
232.1 KB
|
Virus Inoculation on Social Graphs The Friendship Factor.pdf
|
222.6 KB
|
Taking a Lesson from Stealthy Rootkits.pdf
|
221.9 KB
|
The Legislative Response to the Evolution of Computer Viruses.pdf
|
220.6 KB
|
The Bulgarian and Soviet Virus Factories.pdf
|
218.0 KB
|
The Zombie Roundup Understanding, Detecting, and Disrupting Botnets.pdf
|
217.1 KB
|
The Computer Virus -- From There to Here.pdf
|
215.9 KB
|
The Danger Theory and Its Application to Artificial Immune Systems.pdf
|
215.5 KB
|
SweetBait Zero-Hour Worm Detection and Containment Using Honeypots.pdf
|
215.0 KB
|
There Are No Safe Virus Tests.pdf
|
213.7 KB
|
The dynamics of computer virus infection.pdf
|
209.6 KB
|
Viruses and Lotus Notes- Have the Virus Writers Finally Met Their Match.pdf
|
209.3 KB
|
Using biological models to improve innovation systems.pdf
|
206.2 KB
|
Unpredictable Legacies Viral Games in the Networked World.pdf
|
205.0 KB
|
Young Nussbaum Monin PSPB 2007.pdf
|
198.8 KB
|
With Microscope and Tweezers An Analysis of the Internet Virus of November 1988.pdf
|
197.7 KB
|
Worms of the future.pdf
|
196.9 KB
|
The Future of Internet Worms.pdf
|
194.6 KB
|
Toward an abstract computer virology.pdf
|
193.4 KB
|
Viruses and Computer Security.pdf
|
189.2 KB
|
The Risk of Debug Codes in Batch what are debug codes and why they are dangerous.pdf
|
188.9 KB
|
There Is No Ideal Virus Scanner.pdf
|
187.6 KB
|
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet.pdf
|
178.9 KB
|
The Case for Using Layered Defenses to Stop Worms.pdf
|
178.1 KB
|
Unknown Malcode Detection via Text Categorization and the Imbalance Problem.pdf
|
174.9 KB
|
Trends in Viruses and Worms.pdf
|
168.7 KB
|
Towards Automated Defense from Rootkit Attacks.pdf
|
168.4 KB
|
System and method for detecting malicious executable code.pdf
|
166.8 KB
|
Unknown Malicious Code Detection # Practical Issues.pdf
|
165.6 KB
|
Viral polymorphism.pdf
|
165.2 KB
|
Using Malware to Improve Software Quality and Security.pdf
|
163.6 KB
|
The Engine of the Underground The Elite-Kiddie Divide.pdf
|
163.1 KB
|
Viruses & spam fuel new laws.pdf
|
159.4 KB
|
creation dun Web Worm.pdf
|
158.7 KB
|
Viruses and the Law.pdf
|
158.6 KB
|
The Code of Life A look at emerging Artificial Life.pdf
|
158.0 KB
|
The Ecology of Malware.pdf
|
153.5 KB
|
The Code Red Worm.pdf
|
151.9 KB
|
The Social Psychology of Computer Viruses and Worms.pdf
|
151.6 KB
|
Virus Verification and Removal Tools and Techniques.pdf
|
151.0 KB
|
Windows Rootkits.pdf
|
149.9 KB
|
Worm Epidemics in High-Speed Networks.pdf
|
148.1 KB
|
Worm Defense System for Enterprise Networks.pdf
|
146.9 KB
|
Viruses, Worms, and Trojan Horses Serious Crimes, Nuisance, or Both.pdf
|
145.9 KB
|
Virus authors faster to the kill.pdf
|
145.4 KB
|
Using Qualia and Hierarchical Models in Malware Detection.pdf
|
144.0 KB
|
Winning the battles, losing the war Rethinking methodology for forensic computing research.pdf
|
142.1 KB
|
TheV-Files A dictionary of file threats.pdf
|
138.2 KB
|
The solution in the naming chaos.pdf
|
137.9 KB
|
The Evolution of Viruses and Worms.pdf
|
135.8 KB
|
When Computer Viruses Strike.pdf
|
133.1 KB
|
Why Anti-Virus Software Cannot Stop the Spread of Email Worms.pdf
|
132.0 KB
|
Viral Evolution.pdf
|
131.3 KB
|
The Java mobile risk.pdf
|
130.5 KB
|
The Impact of Countermeasure Spreading on the Prevalence of Computer Viruses.pdf
|
127.2 KB
|
Throttling Viruses Restricting propagation to defeat malicious mobile code.pdf
|
124.8 KB
|
Viruses in France The French Connection - II.pdf
|
124.0 KB
|
Using Code Normalization for Fighting Self-Mutating Malware.pdf
|
123.5 KB
|
The Virus is Worse than the Cure.pdf
|
122.7 KB
|
Zmist Opportunities.pdf
|
122.1 KB
|
TAU cure for computer viruses.pdf
|
121.4 KB
|
The Asexual Virus Computer Viruses in Feminist Discourse.pdf
|
119.5 KB
|
Viruses Are Beginning to Get to Me!.pdf
|
118.6 KB
|
Virus Prevention, Cure and Hoaxes.pdf
|
117.1 KB
|
VX Reversing I, the basics.pdf
|
115.9 KB
|
The future of virus detection.pdf
|
115.6 KB
|
The Virus Hunter.pdf
|
113.6 KB
|
Virus Writers The End of The Innocence.pdf
|
111.7 KB
|
The ABC of computer security.pdf
|
107.1 KB
|
The Design Space of Metamorphic Malware.pdf
|
104.7 KB
|
The Internet Worm Incident.pdf
|
102.9 KB
|
Thoughts about Cross-View based Rootkit Detection.pdf
|
101.2 KB
|
Virus attack - how computer networks could heal themselves.pdf
|
99.7 KB
|
The motivation behind computer viruses.pdf
|
99.5 KB
|
Using Markov Chains to Filter Machine-morphed Variants of Malicious Programs.pdf
|
98.7 KB
|
Windows Rootkit Overview.pdf
|
96.8 KB
|
Understanding and Managing Polymorphic Viruses.pdf
|
96.3 KB
|
Warnings of a Dark Future The Emergence of Machine Intelligence.pdf
|
95.1 KB
|
Viruses That Intricate Yarn.pdf
|
94.9 KB
|
Viruses 101.pdf
|
94.4 KB
|
VX Reversing II, Sasser.B.pdf
|
94.0 KB
|
Where have the worms and viruses gone - new trends in malware.pdf
|
93.7 KB
|
The Virus Underground.pdf
|
92.3 KB
|
Threats to Digitization Computer Virus.pdf
|
91.2 KB
|
The metamorphosis of malware writers.pdf
|
85.3 KB
|
What is Wild.pdf
|
85.2 KB
|
Using Verification Technology to Specify and Detect Malware.pdf
|
82.8 KB
|
The Future of Malware.pdf
|
82.5 KB
|
Virus Protection.pdf
|
81.5 KB
|
Viruses Are Not Speech.pdf
|
81.3 KB
|
Trends of Spyware, Viruses and Exploits.pdf
|
79.4 KB
|
The Computer Virus Culture.pdf
|
78.9 KB
|
The More Things Change....pdf
|
74.4 KB
|
Vx-trading.pdf
|
72.4 KB
|
Trap E-mail Address for Combating E-mail Viruses.pdf
|
72.0 KB
|
Zero-hour, Real-time Computer Virus Defense through Collaborative Filtering.pdf
|
71.4 KB
|
Trapping Viruses.pdf
|
70.1 KB
|
Tumours and polips.pdf
|
68.9 KB
|
Vulnerabilities as monsters the cultural foundations of computer security (extended abstract).pdf
|
68.1 KB
|
Understanding Virus Behavior in 32-bit Operating Environments.pdf
|
66.5 KB
|
The wormpipe strikes back.pdf
|
66.0 KB
|
Virentechniken Analyse und Metamorphismus.pdf
|
65.6 KB
|
The Real Cost of a Virus Outbreak.pdf
|
63.9 KB
|
The Evolution of the Computer Virus.pdf
|
63.2 KB
|
The Future of Bot Worms.pdf
|
62.3 KB
|
Timing Rootkits.pdf
|
61.8 KB
|
Twinkle, twinkle little star.pdf
|
61.0 KB
|
To catch Efish.pdf
|
61.0 KB
|
The malware naming chaos.pdf
|
60.6 KB
|
Viruses a concern for all of us.pdf
|
60.1 KB
|
What's in a Name.pdf
|
60.1 KB
|
The Race Against Malicious Software.pdf
|
50.9 KB
|
The missing LNK.pdf
|
48.6 KB
|
THE MALICIOUS LOGIC BATTLE UNDERSTANDING THE ENEMY.pdf
|
47.8 KB
|
The Evolving Virus Threat.pdf
|
47.0 KB
|
Those ubiquitous viruses.pdf
|
44.2 KB
|
The Case for Beneficial Computer Viruses and Worms.pdf
|
43.6 KB
|
The Challenge of Being Prepared for Tomorrows MalWare Today.pdf
|
43.0 KB
|
The biology of digital organisms.pdf
|
42.9 KB
|
Un combate con el Kerado.pdf
|
41.7 KB
|
You've got M()a(D)i(L+K)l.pdf
|
41.6 KB
|
Viruses using .NET Framework.pdf
|
41.3 KB
|
Taming Lakatos' Monster - Computer Virus Epidemics and Internet Security Policy.pdf
|
40.2 KB
|
Unexpected Resutls [sic].pdf
|
39.9 KB
|
The road less truvelled.pdf
|
39.7 KB
|
VIRUS, Very Important Resource Under Siege.pdf
|
39.1 KB
|
When Java Was One Threats From Hostile Byte Code.pdf
|
39.1 KB
|
Viral Style Technology, Culture, and the Politics of Infection.pdf
|
36.5 KB
|
Time machine.pdf
|
32.4 KB
|
The cause and effects of computer viruses.pdf
|
31.4 KB
|
Writing disassembler.pdf
|
27.7 KB
|
What's the difference between a Virus, Worm, and Trojan horse.pdf
|
22.0 KB
|
The Brains Behind the Operation.pdf
|
21.8 KB
|
Virology 101.pdf
|
21.2 KB
|
The Bulgarian Computer Virus Factory.pdf
|
9.8 KB
|
Virus Trends 2003-2004.pdf
|
9.6 KB
|
Web Sites Hawk Instructions On Making Computer Viruses.pdf
|
8.7 KB
|
Universal Procedures to Protect Against Computer Viruses.pdf
|
6.3 KB
|
The Bite of the Computer Virus.pdf
|
3.9 KB
|
Total files 250
|