Anti-worm

Results: 47



#Item
21Anti-Virus Comparative  Malware Removal Test Language: English March - October 2014

Anti-Virus Comparative Malware Removal Test Language: English March - October 2014

Add to Reading List

Source URL: www.av-comparatives.org

Language: English - Date: 2014-12-05 03:58:41
22Threat Summaries Volume 2: [removed]

Threat Summaries Volume 2: [removed]

Add to Reading List

Source URL: www.f-secure.com

Language: English - Date: 2014-09-19 05:29:53
23Simulating and optimising worm propagation algorithms Tom Vogt <tom@lemuria.org> 29th September 2003 (updated 9th February 2004) Abstract This paper describes a series of simulations run to estimate various worm growth p

Simulating and optimising worm propagation algorithms Tom Vogt 29th September 2003 (updated 9th February 2004) Abstract This paper describes a series of simulations run to estimate various worm growth p

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2004-02-09 10:36:14
24An Email Worm Vaccine Architecture Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science, Columbia University {stelios,ji,angelos,sal}@cs.columbia.edu  Abstract.

An Email Worm Vaccine Architecture Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science, Columbia University {stelios,ji,angelos,sal}@cs.columbia.edu Abstract.

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2005-01-30 15:22:18
25“Good” Worms and Human Rights John Aycock Department of Computer Science University of Calgary 2500 University Drive N.W. Calgary, Alberta, Canada T2N 1N4

“Good” Worms and Human Rights John Aycock Department of Computer Science University of Calgary 2500 University Drive N.W. Calgary, Alberta, Canada T2N 1N4

Add to Reading List

Source URL: pages.cpsc.ucalgary.ca

Language: English - Date: 2006-10-18 11:33:08
26Microsoft PowerPoint - Khan-VN_Network Security in Vietnam and VNCERT.ppt

Microsoft PowerPoint - Khan-VN_Network Security in Vietnam and VNCERT.ppt

Add to Reading List

Source URL: www.oecd.org

Language: English - Date: 2014-07-21 01:39:51
27Steward Observatory Computer Operating Agreement January 20, 2004 This is the operating agreement for equipment attached to the Steward Observatory computer network, defined for these purposes to be any network that the

Steward Observatory Computer Operating Agreement January 20, 2004 This is the operating agreement for equipment attached to the Steward Observatory computer network, defined for these purposes to be any network that the

Add to Reading List

Source URL: www.as.arizona.edu

Language: English - Date: 2012-12-14 15:24:53
28:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.

:: Heuristic Analysis— Detecting Unknown Viruses Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too.

Add to Reading List

Source URL: www.eset.com

Language: English - Date: 2011-02-28 17:14:03
29OUCH! | December[removed]IN THIS ISSUE... • Overview • How Anti-Virus Works • Anti-Virus Tips

OUCH! | December[removed]IN THIS ISSUE... • Overview • How Anti-Virus Works • Anti-Virus Tips

Add to Reading List

Source URL: it.nv.gov

Language: English - Date: 2014-12-11 12:11:50
30OUCH! | December[removed]IN THIS ISSUE... •	 Overview •	 How Anti-Virus Works •	 Anti-Virus Tips

OUCH! | December[removed]IN THIS ISSUE... • Overview • How Anti-Virus Works • Anti-Virus Tips

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2014-12-02 11:07:10