Malicious

Results: 683



#Item
111EvilSeed: A Guided Approach to Finding Malicious Web Pages L. Invernizzi1 S. Benvenuti2 M. Cova3,5 P. Milani Comparetti4,5 C. Kruegel1 G. Vigna1 1 UC

EvilSeed: A Guided Approach to Finding Malicious Web Pages L. Invernizzi1 S. Benvenuti2 M. Cova3,5 P. Milani Comparetti4,5 C. Kruegel1 G. Vigna1 1 UC

Add to Reading List

Source URL: www.ieee-security.org

Language: Italian - Date: 2012-05-23 09:25:03
    112Equilibria for networks with malicious users George Karakostas∗ McMaster University Anastasios Viglas† University of Toronto

    Equilibria for networks with malicious users George Karakostas∗ McMaster University Anastasios Viglas† University of Toronto

    Add to Reading List

    Source URL: www.cas.mcmaster.ca

    Language: English - Date: 2003-12-28 20:54:33
    113Malicious or Scam Calls How we can help you If you are unfortunate enough to receive malicious, scam or nuisance calls on your telephone, we may be able to help you. These calls cause distress and inconvenience whether t

    Malicious or Scam Calls How we can help you If you are unfortunate enough to receive malicious, scam or nuisance calls on your telephone, we may be able to help you. These calls cause distress and inconvenience whether t

    Add to Reading List

    Source URL: www.theguernseydirectory.com

    Language: English - Date: 2016-03-21 08:10:39
    114Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov  Jörg Schwenk

    Do not trust me: Using malicious IdPs for analyzing and attacking Single Sign-On Christian Mainka Vladislav Mladenov Jörg Schwenk

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2016-04-20 11:46:50
    115Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions Sajjad Arshad, Amin Kharraz, and William Robertson Northeastern University, Boston, USA {arshad,mkharraz,wkr}@ccs.neu.edu

    Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions Sajjad Arshad, Amin Kharraz, and William Robertson Northeastern University, Boston, USA {arshad,mkharraz,wkr}@ccs.neu.edu

    Add to Reading List

    Source URL: fc16.ifca.ai

    Language: English - Date: 2016-02-08 20:23:36
      116Application Penetration Testing No application is impervious to malicious threats. Casaba can help identify vulnerabilities and prevent attacks. Why Application Penetration Testing?  Get Started

      Application Penetration Testing No application is impervious to malicious threats. Casaba can help identify vulnerabilities and prevent attacks. Why Application Penetration Testing? Get Started

      Add to Reading List

      Source URL: www.casaba.com

      Language: English - Date: 2016-02-27 02:48:49
        117No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Oleksii Starov‡ , Johannes Dahse† , Syed Sharique Ahmad‡ , Thorsten Holz† , Nick Nikiforakis‡  ‡

        No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells Oleksii Starov‡ , Johannes Dahse† , Syed Sharique Ahmad‡ , Thorsten Holz† , Nick Nikiforakis‡ ‡

        Add to Reading List

        Source URL: www.securitee.org

        Language: English - Date: 2016-02-12 11:00:10
          118E VIL C OHORT: Detecting Communities of Malicious Accounts on Online Services Gianluca Stringhini§, , Pierre Mourlanne? , Gregoire Jacob‡ , † Manuel Egele , Christopher Kruegel? , and Giovanni Vigna? †

          E VIL C OHORT: Detecting Communities of Malicious Accounts on Online Services Gianluca Stringhini§, , Pierre Mourlanne? , Gregoire Jacob‡ , † Manuel Egele , Christopher Kruegel? , and Giovanni Vigna? †

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English - Date: 2015-07-01 15:06:26
            119BlackCoin’s Proof-of-Stake Protocol v2 Pavel Vasin www.blackcoin.co Abstract—The current Proof of Stake protocol has several potential security issues: coin age can be abused by malicious nodes to gain significant ne

            BlackCoin’s Proof-of-Stake Protocol v2 Pavel Vasin www.blackcoin.co Abstract—The current Proof of Stake protocol has several potential security issues: coin age can be abused by malicious nodes to gain significant ne

            Add to Reading List

            Source URL: blackcoin.co

            Language: English - Date: 2016-02-17 22:48:53