Cert

Results: 6908



#Item
131Identificac¸a˜ o e Caracterizac¸a˜ o de Spammers a partir de Listas de Destinat´arios ´ Ribeiro1 , Dorgival Olavo Guedes1 , Wagner Meira Jr.1 Pedro H. Calais Guerra1 , Marco Tulio 2 Cristine Hoepers , Klaus Steding

Identificac¸a˜ o e Caracterizac¸a˜ o de Spammers a partir de Listas de Destinat´arios ´ Ribeiro1 , Dorgival Olavo Guedes1 , Wagner Meira Jr.1 Pedro H. Calais Guerra1 , Marco Tulio 2 Cristine Hoepers , Klaus Steding

Add to Reading List

Source URL: honeytarg.cert.br

- Date: 2016-08-18 14:51:39
    132Spamming Chains: A New Way of Understanding Spammer Behavior Pedro H. Calais Guerra Dorgival Guedes

    Spamming Chains: A New Way of Understanding Spammer Behavior Pedro H. Calais Guerra Dorgival Guedes

    Add to Reading List

    Source URL: honeytarg.cert.br

    - Date: 2016-08-18 14:51:38
      133Segurança em Redes Sociais <Nome> <Instituição> <e-mail>

      Segurança em Redes Sociais

      Add to Reading List

      Source URL: cartilha.cert.br

      - Date: 2017-03-16 11:07:47
        134INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA SRI LANKA CERT|CC Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of

        INFORMATION AND CYBER SECURITY STRATEGY OF SRI LANKA SRI LANKA CERT|CC Preface Around the globe, digital technologies have evolved into a powerful economic tool that has improved quality of

        Add to Reading List

        Source URL: www.slcert.gov.lk

        - Date: 2018-02-09 00:46:39
          135Ransomware  <Nome> <Instituição> <e-mail>

          Ransomware

          Add to Reading List

          Source URL: cartilha.cert.br

          - Date: 2017-03-16 11:07:50
            136CANDIDATE CERTIFICATION AGREEMENT (Version 3.0) w.e.f. February 1st, 2012

            CANDIDATE CERTIFICATION AGREEMENT (Version 3.0) w.e.f. February 1st, 2012

            Add to Reading List

            Source URL: cert.eccouncil.org

            - Date: 2016-10-19 07:54:54
              137Publicação  https://cartilha.cert.br/ Contas e senhas são os mecanismos de autenticação mais utilizados na

              Publicação https://cartilha.cert.br/ Contas e senhas são os mecanismos de autenticação mais utilizados na

              Add to Reading List

              Source URL: cartilha.cert.br

              - Date: 2017-03-16 11:07:47
                138Uma metodologia para identificac¸a˜ o adaptativa e caracterizac¸a˜ o de phishing Pedro Henrique B. Las-Casas1 , Osvaldo Fonseca1 , Elverton Fazzion1 Cristine Hoepers2 , Klaus Steding-Jessen2 , Marcelo H. P. Chaves2 ,

                Uma metodologia para identificac¸a˜ o adaptativa e caracterizac¸a˜ o de phishing Pedro Henrique B. Las-Casas1 , Osvaldo Fonseca1 , Elverton Fazzion1 Cristine Hoepers2 , Klaus Steding-Jessen2 , Marcelo H. P. Chaves2 ,

                Add to Reading List

                Source URL: honeytarg.cert.br

                - Date: 2016-08-18 14:51:39
                  139Spam Miner: A Platform for Detecting and Characterizing Spam Campaigns ∗ Pedro H. Calais Guerra

                  Spam Miner: A Platform for Detecting and Characterizing Spam Campaigns ∗ Pedro H. Calais Guerra

                  Add to Reading List

                  Source URL: honeytarg.cert.br

                  - Date: 2016-08-18 14:51:39
                    140A Campaign-based Characterization of Spamming Strategies  Pedro H. Calais, Douglas E. V. Pires Cristine Hoepers, Dorgival Olavo Guedes, Wagner Meira Jr. Klaus Steding-Jessen

                    A Campaign-based Characterization of Spamming Strategies Pedro H. Calais, Douglas E. V. Pires Cristine Hoepers, Dorgival Olavo Guedes, Wagner Meira Jr. Klaus Steding-Jessen

                    Add to Reading List

                    Source URL: honeytarg.cert.br

                    - Date: 2016-08-18 14:51:38