21![Technical Advisory: CVEs Assigned to Upstream Devices Exploited by Mirai IoT Botnet Advisory #1 Product: All known XiongMai Technology Devices Type of Device: IP Camera, DVR and NVR Type of Vulnerability: Default Authent Technical Advisory: CVEs Assigned to Upstream Devices Exploited by Mirai IoT Botnet Advisory #1 Product: All known XiongMai Technology Devices Type of Device: IP Camera, DVR and NVR Type of Vulnerability: Default Authent](https://www.pdfsearch.io/img/2fc8f699a8132fb571dbd8329a7866a5.jpg) | Add to Reading ListSource URL: www.flashpoint-intel.com- Date: 2016-10-06 18:50:12
|
---|
22![Microsoft Word - proactive-botnet-countermeasures.doc Microsoft Word - proactive-botnet-countermeasures.doc](https://www.pdfsearch.io/img/7afd132c729e196602701b24c0fb5ffe.jpg) | Add to Reading ListSource URL: four.cs.uni-bonn.de- Date: 2009-10-22 05:16:21
|
---|
23![Discovering a botnet from Russia (With love) Damien Aumaitre - Christophe Devaux - Julien Lenoir - Sogeti/ESEC Discovering a botnet from Russia (With love) Damien Aumaitre - Christophe Devaux - Julien Lenoir - Sogeti/ESEC](https://www.pdfsearch.io/img/703e933d9e05b36904e40c32b8f2b41f.jpg) | Add to Reading ListSource URL: esec-lab.sogeti.com- Date: 2016-07-01 12:08:46
|
---|
24![SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales](https://www.pdfsearch.io/img/89fdee04e67cfcc8b48d8547897f5253.jpg) | Add to Reading ListSource URL: www.rsaconference.comLanguage: English - Date: 2016-07-18 23:27:59
|
---|
25![Microsoft Word - MLI January 06 Report _PW-FINAL1_.doc Microsoft Word - MLI January 06 Report _PW-FINAL1_.doc](https://www.pdfsearch.io/img/5dd8c913c5f2ba405146eb9e60d24923.jpg) | Add to Reading ListSource URL: londonactionplan.orgLanguage: English - Date: 2016-04-26 15:59:17
|
---|
26![On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland On the Interplay of Link-Flooding Attacks and Traffic Engineering Dimitrios Gkounis1 , Vasileios Kotronis2 , Christos Liaskos3 , Xenofontas Dimitropoulos3∗ 1 NEC 2 ETH Zurich, Switzerland](https://www.pdfsearch.io/img/f7a8b9c1569b470da281f968de1f2374.jpg) | Add to Reading ListSource URL: inspire.edu.grLanguage: English - Date: 2016-04-22 11:14:02
|
---|
27![C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi C:/Users/beck/Desktop/CSET CONFERENCE 2010/USENIX template/4_11_DRAFT2/jayaram_drmiller changes/FINAL_SUBMISSION_AFTER REVIEW/CSET_submission.dvi](https://www.pdfsearch.io/img/51ad61a859fc39772028bff109dcd788.jpg) | Add to Reading ListSource URL: static.usenix.orgLanguage: English - Date: 2011-07-08 13:42:23
|
---|
28![Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology Impeding Automated Malware Analysis Paul Royal College of Computing Georgia Institute of Technology](https://www.pdfsearch.io/img/62eef9160c6e478bf2353e2a99caf590.jpg) | Add to Reading ListSource URL: countermeasure2012.comLanguage: English - Date: 2012-11-01 08:16:33
|
---|
29![Prudent Practices for Designing Malware Experiments: Status Quo and Outlook Prudent Practices for Designing Malware Experiments: Status Quo and Outlook](https://www.pdfsearch.io/img/1f8244a4376fa70305a4478e5c6a7c2c.jpg) | Add to Reading ListSource URL: norbert-pohlmann.comLanguage: English - Date: 2015-10-20 13:17:19
|
---|
30![BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu1 , Phillip Porras2 , Vinod Yegneswaran2 , Martin Fong2 , Wenke Lee1 1 College of Computing Georgia Institute of Technology](https://www.pdfsearch.io/img/55ceb5d5676366962555ca9db354554f.jpg) | Add to Reading ListSource URL: www.cyber-ta.orgLanguage: English - Date: 2007-06-29 16:14:13
|
---|