Malicious

Results: 683



#Item
101Offences which are to be disclosed subject to rules on Higher Level Disclosures (Standard, Enhanced and PVG Scheme Records) The list below is not exhaustive Legislation (where applicable)  Description of Offence

Offences which are to be disclosed subject to rules on Higher Level Disclosures (Standard, Enhanced and PVG Scheme Records) The list below is not exhaustive Legislation (where applicable) Description of Offence

Add to Reading List

Source URL: www.disclosurescotland.co.uk

Language: English - Date: 2016-04-28 05:18:26
102A BAYESIAN GAME APPROACH TO COEXISTENCE WITH MALICIOUS AND SELFISH NODES IN WIRELESS AD-HOC NETWORKS By J. ANDREW ROLES

A BAYESIAN GAME APPROACH TO COEXISTENCE WITH MALICIOUS AND SELFISH NODES IN WIRELESS AD-HOC NETWORKS By J. ANDREW ROLES

Add to Reading List

Source URL: www2.stetson.edu

Language: English - Date: 2014-05-07 15:37:26
103Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:39
    104No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Oleksii Starov‡ , Johannes Dahse† , Syed Sharique Ahmad‡ , Thorsten Holz† , Nick Nikiforakis‡  ‡

    No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Oleksii Starov‡ , Johannes Dahse† , Syed Sharique Ahmad‡ , Thorsten Holz† , Nick Nikiforakis‡ ‡

    Add to Reading List

    Source URL: www.securitee.org

    Language: English - Date: 2016-02-12 11:00:10
      105Tracing Malicious Proxies in Proxy Re-Encryption Benoˆıt Libert1 and Damien Vergnaud2 1  Universit´e Catholique de Louvain, Crypto Group

      Tracing Malicious Proxies in Proxy Re-Encryption Benoˆıt Libert1 and Damien Vergnaud2 1 Universit´e Catholique de Louvain, Crypto Group

      Add to Reading List

      Source URL: perso.uclouvain.be

      Language: English - Date: 2008-07-30 08:44:52
        106Detecting Malicious Javascript in PDF through Document Instrumentation Daiping Liu Department of Computer Science College of William and Mary

        Detecting Malicious Javascript in PDF through Document Instrumentation Daiping Liu Department of Computer Science College of William and Mary

        Add to Reading List

        Source URL: www.cs.wm.edu

        Language: English - Date: 2014-05-10 22:10:53
          107User Information Malicious Calls How we can help you If you are unfortunate enough to receive malicious or nuisance calls on your telephone, we may be able to help you. These calls cause distress and inconvenience whethe

          User Information Malicious Calls How we can help you If you are unfortunate enough to receive malicious or nuisance calls on your telephone, we may be able to help you. These calls cause distress and inconvenience whethe

          Add to Reading List

          Source URL: www.theguernseydirectory.com

          Language: English - Date: 2014-07-14 04:55:06
            108Automatic Exploit Prevention Technology Kaspersky Lab’s approach to security is based on multiple layers of protection. The majority of malicious programs are stopped in the first layer – for example, they may be cau

            Automatic Exploit Prevention Technology Kaspersky Lab’s approach to security is based on multiple layers of protection. The majority of malicious programs are stopped in the first layer – for example, they may be cau

            Add to Reading List

            Source URL: dennisnadeaucomplaint.com

            Language: English - Date: 2015-06-30 19:19:24
              109Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

              Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

              Add to Reading List

              Source URL: seclab.illinois.edu

              Language: English - Date: 2015-09-18 14:18:12
                110Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg  Dept. of Computer Science

                Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg Dept. of Computer Science

                Add to Reading List

                Source URL: www2016.net

                Language: English - Date: 2016-04-10 09:10:41