FileMood

Download PDF Pack Release

PDF Pack Release

Name

PDF Pack Release

 DOWNLOAD Copy Link

Total Size

46.1 MB

Total Files

118

Hash

A1F6AC159DEC55319ED38C3D5A2BB4CF976D43AC

/

A Framework for Deception.pdf

2.8 MB

A method to detect metamorphic computer viruses.pdf

2.5 MB

ACPI and SMI handlers some limits to trusted computing.pdf

1.5 MB

An Approach towards Disassembly of Malicious Binary Executables.pdf

1.5 MB

A Method for Detecting Obfuscated Calls in Malicious Binaries.pdf

1.4 MB

A History Of Computer Viruses - The Famous `Trio'.pdf

1.4 MB

A Study of Malcode-Bearing Documents.pdf

1.2 MB

A Formal Definition of Computer Worms and Some Related Results.pdf

1.2 MB

An Approach to Containing Computer Viruses.pdf

1.1 MB

A Comprehensive Program for Preventing and Detecting Computer Viruses Is Needed.pdf

1.1 MB

Analysis and detection of metamorphic computer viruses.pdf

954.1 KB

Analysis of rxbot.pdf

835.4 KB

A History Of Computer Viruses - Three Special Viruses.pdf

809.0 KB

A Short Visit to the Bot Zoo.pdf

760.0 KB

An Abstract Theory of Computer Viruses.pdf

747.0 KB

A PHYSIOLOGICAL DECOMPOSITION OF VIRUS AND WORM PROGRAMS.pdf

732.6 KB

A Short Course on Computer Viruses.pdf

731.8 KB

A Public Health Approach to Preventing Malware Propagation.pdf

725.3 KB

A fault tolerance approach to computer viruses.pdf

696.1 KB

A Proposed Taxonomy of Software Weapons.pdf

672.6 KB

Analysis and Detection of Computer Viruses and Worms.pdf

667.4 KB

An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques.pdf

621.6 KB

Analysis of Web Application Worms and Viruses.pdf

603.5 KB

Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf

594.9 KB

Abstraction-Based Intrusion Detection In Distributed Environments.pdf

590.6 KB

A Generic Virus Detection Agent on the Internet.pdf

573.1 KB

Advanced Polymorphic Techniques.pdf

545.2 KB

A Distributed Approach against Computer Viruses Inspired by the Immune System.pdf

521.0 KB

Advanced fuzzing in the VoIP space.pdf

515.8 KB

A Virtual Honeypot Framework.pdf

461.6 KB

A theoretical model of differential social attributions toward computing technology when the metaphor becomes the model.pdf

435.6 KB

A bit of viral protection is worth a megabyte of cure.pdf

427.3 KB

API Win32 ancestrales pour Chevaux de Troie hyper furtifs.pdf

417.8 KB

A general definition of malware.pdf

416.8 KB

An Overview of Unix Rootkits.pdf

412.9 KB

A Mathematical Theory for the Spread of Computer Viruses.pdf

409.7 KB

Analysis of a scanning model of worm propagation.pdf

407.0 KB

ARTISTA A Network for ARTifical Immune SysTems.pdf

400.2 KB

A software authentication system for the prevention of computer viruses.pdf

388.0 KB

A parallel String Matching Engine for use in high speed network intrusion detection systems.pdf

383.7 KB

A History Of Computer Viruses - Introduction.pdf

381.6 KB

A Semantics-Based Approach to Malware Detection.pdf

352.2 KB

A Retrovirus Inspired Algorithm for Virus Detection & Optimization.pdf

351.6 KB

A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations.pdf

345.8 KB

A Fast Static Analysis Approach To Detect Exploit Code Inside Network Flows.pdf

327.7 KB

Advanced Metamorphic Techniques in Computer Viruses.pdf

318.2 KB

A Framework to Detect Novel Computer Viruses via System Calls.pdf

318.1 KB

A Theoretical Superworm.pdf

317.9 KB

Anatomy of a Semantic Virus.pdf

313.2 KB

A Self-reproducing Analogue.pdf

311.8 KB

AGISA Towards Automatic Generation of Infection Signatures.pdf

294.9 KB

A Potency Relation for Worms and Next-Generation Attack Tools.pdf

289.2 KB

A statistical model for undecidable viral detection.pdf

282.2 KB

A Sense of 'Danger' for Windows Processes.pdf

280.1 KB

A Survey of Cryptologic Issues in Computer Virology.pdf

277.4 KB

A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table.pdf

272.6 KB

An Architecture for Generating Semantic-Aware Signatures.pdf

269.4 KB

A Hybrid Model to Detect Malicious Executables.pdf

251.6 KB

Adequacy of Checksum Algorithms for Computer Virus Detection.pdf

241.8 KB

A Feature Selection and Evaluation Scheme for Computer Virus Detection.pdf

235.4 KB

Advanced Routing Worm and Its Security Challenges.pdf

233.6 KB

A framework for modelling trojans and computer virus infection.pdf

233.2 KB

A Specter Is Haunting Networks - The Specter of Viruses, Hidden in Horses.pdf

231.8 KB

An Email Worm Vaccine Architecture.pdf

217.6 KB

A Hygiene Lesson.pdf

217.3 KB

An Introduction to Intrusion-Detection Systems.pdf

200.6 KB

Analyzing Worms and Network Traffic using Compression.pdf

200.2 KB

A Trust System Based on Multi Level Virus Detection.pdf

197.6 KB

An Efficient Control of Virus Propagation.pdf

193.1 KB

A note on Cohen's formal model for computer viruses.pdf

186.9 KB

A Study of Detecting Computer Viruses in Real-Infected Files in the n-gram Representation with Machine Learning Methods.pdf

179.7 KB

An Evaluation of Two Host Based Intrusion Prevention Systems.pdf

175.2 KB

A Memory Symptom-based Virus Detection Approach.pdf

171.4 KB

A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf

167.8 KB

Abstract Detection of Computer Viruses.pdf

167.1 KB

A unified prediction of computer virus spread in connected networks.pdf

167.0 KB

Algebraic Specification of Computer Viruses and Their Environments.pdf

166.2 KB

An OS Independent Heuristics-based Worm-containment System.pdf

163.3 KB

A Classification of Viruses through Recursion Theorems.pdf

160.9 KB

Acquisition of Malicious Code Using Active Learning.pdf

158.2 KB

An epidemiological model of virus spread and cleanup.pdf

153.3 KB

A Web-Based Network Worm Simulator.pdf

148.3 KB

A study of anti-virus' response to unknown threats.pdf

145.9 KB

An Epidemiological View of Worms and Viruses.pdf

145.7 KB

Accurately Detecting Source Code of Attacks That Increase Privilege.pdf

142.4 KB

A Filter That Prevents the Spread of Mail-Attachment-Type Trojan Horse Computer Worms.pdf

142.4 KB

A Plague of Viruses Biological, Computer and Marketing.pdf

135.9 KB

A Dozen Dangerous Myths About Computer Viruses.pdf

112.0 KB

A Bypass of Cohen's Impossibility Result.pdf

109.3 KB

A Pact with the Devil.pdf

108.8 KB

A Taxonomy of Computer Worms.pdf

102.7 KB

Abstracts of Recent Articles and Literature.pdf

100.5 KB

A Critical Look at the Regulation of Computer Viruses.pdf

98.6 KB

A Generic Virus Scanner in C++.pdf

98.4 KB

A Failure to Learn from the Past.pdf

97.0 KB

ASM-based Modelling of Self-Replicating Programs.pdf

95.0 KB

A Cost Analysis of Typical Computer Viruses and Defenses.pdf

93.5 KB

A Technique for Removing an Important Class of Trojan Horses from High Order Languages.pdf

86.4 KB

AUTOMATICALLY GENERATED WIN32 HEURISTIC VIRUS DETECTION.pdf

84.5 KB

An Internet-Worm Early Warning System.pdf

83.2 KB

A Cooperative Immunization System for an Untrusting Internet.pdf

76.4 KB

A pilot study on college student's attitudes toward computer virus.pdf

76.0 KB

An Overview of Computer Viruses in a Research Environment.pdf

73.4 KB

ARTIFICIAL IMMUNITY USING CONSTRAINT-BASED DETECTORS.pdf

73.4 KB

A Network Worm Vaccine Architecture.pdf

72.3 KB

A Tour of the Worm.pdf

72.2 KB

Analysis of Virus Algorithms.pdf

70.2 KB

A Sense of Self for Unix Processes.pdf

69.8 KB

An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code.pdf

68.9 KB

A week is a long time in computer ethics.pdf

67.8 KB

A Worst-Case Worm.pdf

67.1 KB

An Epidemic Model of Mobile Phone Virus.pdf

49.8 KB

An Introduction to Computer Viruses.pdf

38.8 KB

An Undetectable Computer Virus.pdf

33.7 KB

64-bit rugrats.pdf

31.0 KB

A Computational Model of Computer Virus Propagation.pdf

14.8 KB

A Response to the March 31, 2005 Wall Street Journal Article from Mark Ludwig.pdf

12.0 KB

A Computer Virus Is A Thought Manifested.pdf

5.8 KB

 

Total files 118


Copyright © 2024 FileMood.com