Computer worm

Results: 494



#Item
81Malware / Antivirus software / Computer network security / Social Security Administration / Macro virus / Static single assignment form / Computer security / Virus hoax / Computer worm / System software / Computer viruses / Software

Chapter 16. Security Incident Identification, Reporting and Resolution 7 Chapter 16. Security Incident Identification, Reporting and Resolution

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
82Malware / Computer virus / AVG / Computer worm / NetBIOS / Virus / Avast! / AOL Active Virus Shield / Antivirus software / Software / System software

SAINTwriter Assessment Report Report Generated: April 29, Introduction On April 29, 2010, at 8:28 PM, a Anti-virus Information vulnerability assessment was conducted using the SAINTvulnerability scanner.

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2010-05-13 08:47:06
83Computer security / Espionage / Zero-day attack / Targeted threat / Spyware / Vulnerability / Phishing / Attack / Computer worm / Cyberwarfare / Computer network security / Malware

Targeted Attack Trends 2H 2013 Report A TrendLabsSM Report

Add to Reading List

Source URL: www.trendmicro.de

Language: English - Date: 2014-06-06 01:36:20
84Computer network security / Computer security / Antivirus software / Rootkit / Computer virus / Computer worm / Threat / Conficker / Botnet / System software / Malware / Cyberwarfare

Malware Attribute Enumeration and Characterization Ivan Kirillov Penny Chase MITRE Corporation

Add to Reading List

Source URL: maec.mitre.org

Language: English - Date: 2010-10-14 13:37:00
85Worm / ARPANET / The Shockwave Rider / Computer worms / Literature / Software / Fiction / WANK / Morris worm / Malware / Stration / John Shoch

COMPUTING PRACTICES The "Worm" Programs Early Experience with a Distributed Computation

Add to Reading List

Source URL: vxheaven.org

Language: English - Date: 2005-06-18 21:19:10
86Identifiers / Computer network security / Internet protocols / Email / Network architecture / Computer worm / Malware / Domain name / Top-level domain / Computing / Internet / Domain name system

Putting the Tea back into Cyber Terrorism SensePost Research BlackHat Briefings July 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
87Cyberwarfare / Morris worm / Parasitic worm / Antibody / Computer security / Failure / Computer worms / Warhol worm / SQL Slammer

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:49:58
88Email / Computer-mediated communication / Spam / Phishing / Internet fraud / Malware / Computer worm / Instant messaging / Anti-spam techniques / Internet / Computing / Spamming

Your security on-line There are many dangers lurking on-line and few security measures in place protecting your information at a public Internet access location. Security becomes your own responsibility. Here are some hi

Add to Reading List

Source URL: www.frankston.net

Language: English - Date: 2013-12-11 18:40:04
89Welchia / Morris worm / Blaster / Witty / SQL Slammer / Stration / Server Message Block / Computer virus / Computer security / System software / Computer worms / Software

A Worst-Case Worm ∗ Nicholas Weaver International Computer Science Institute Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-06-08 10:49:32
90Computer security / Spamming / Malware / Goods / Public good / Phishing / Rootkit / Computer worm / Denial-of-service attack / Cyberwarfare / Computer network security / Security

C:/Users/zhdong/Dropbox/Papers/NSPW12/SocialPower_v7.dvi

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2012-08-03 18:24:29
UPDATE