Malicious

Results: 683



#Item
121JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks Bogdan Carbunar, Ioanis Ioannidis and Cristina Nita-Rotaru Department of Computer Sciences Purdue University 250 N. University Street

JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks Bogdan Carbunar, Ioanis Ioannidis and Cristina Nita-Rotaru Department of Computer Sciences Purdue University 250 N. University Street

Add to Reading List

Source URL: homes.cerias.purdue.edu

Language: English - Date: 2004-10-18 14:07:15
    122Enhancing Distributed Systems with Mechanisms to Cope with Malicious Clients Technical Report CNDSDecember 2005 http://www.dsn.jhu.edu Yair Amir, Claudiu Danilov, John Lane Johns Hopkins University

    Enhancing Distributed Systems with Mechanisms to Cope with Malicious Clients Technical Report CNDSDecember 2005 http://www.dsn.jhu.edu Yair Amir, Claudiu Danilov, John Lane Johns Hopkins University

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2006-01-27 10:52:49
      123AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

      AUTOPROBE: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis Zhaoyan Xu Antonio Nappa

      Add to Reading List

      Source URL: faculty.cs.tamu.edu

      Language: English - Date: 2014-09-29 02:03:52
      124Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology  Encrypting smartphones and other tech products will help protect against malicious hacking, identity

      Issue brief: A “backdoor” to encryption for government surveillance Center for Democracy & Technology Encrypting smartphones and other tech products will help protect against malicious hacking, identity

      Add to Reading List

      Source URL: cdt.org

      Language: English - Date: 2014-11-10 17:17:00
        125Ballot secrecy with malicious bulletin boards David Bernhard1 and Ben Smyth2 1 2

        Ballot secrecy with malicious bulletin boards David Bernhard1 and Ben Smyth2 1 2

        Add to Reading List

        Source URL: bensmyth.com

        Language: English - Date: 2015-07-03 12:00:57
          126

          Virus and Malicious Software Protection HPOL#14 Ver1.0

          Add to Reading List

          Source URL: www.cert.gov.lk

          Language: English - Date: 2014-05-12 00:42:32
            127Hulk: Eliciting Malicious Behavior in Browser Extensions  Alexandros Kapravelos  †∗

            Hulk: Eliciting Malicious Behavior in Browser Extensions  Alexandros Kapravelos †∗

            Add to Reading List

            Source URL: www.sysnet.ucsd.edu

            Language: English - Date: 2014-07-08 21:01:45
              128bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection Neha Gupta, Anupama Aggarwal, Ponnurangam Kumaraguru arXiv:1406.3687v1 [cs.CR] 14 Jun 2014

              bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection Neha Gupta, Anupama Aggarwal, Ponnurangam Kumaraguru arXiv:1406.3687v1 [cs.CR] 14 Jun 2014

              Add to Reading List

              Source URL: arxiv.org

              Language: English - Date: 2014-06-16 22:20:02
                129Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket, and Yiheng Li September 2004 CMU-ISRI

                Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants Bradley Malin, Edoardo Airoldi, Samuel Edoho-Eket, and Yiheng Li September 2004 CMU-ISRI

                Add to Reading List

                Source URL: reports-archive.adm.cs.cmu.edu

                Language: English - Date: 2004-09-15 17:07:20
                  130User-Centric Dependence Analysis For Identifying Malicious Mobile Apps Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Blacksburg, VA, USA

                  User-Centric Dependence Analysis For Identifying Malicious Mobile Apps Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Blacksburg, VA, USA

                  Add to Reading List

                  Source URL: www.mostconf.org

                  Language: English - Date: 2012-04-22 18:29:50