Malicious

Results: 683



#Item
141Blackberry Proof-of-Concept: Malicious Applications Mayank Aggarwal, C|EH, SCJP Junos Pulse Global Threat Center  Presented by Konstantin Yemelyanov, PhD

Blackberry Proof-of-Concept: Malicious Applications Mayank Aggarwal, C|EH, SCJP Junos Pulse Global Threat Center Presented by Konstantin Yemelyanov, PhD

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2010-10-30 01:26:03
    142The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers Charles Lever Georgia Institute of Technology

    The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers Charles Lever Georgia Institute of Technology

    Add to Reading List

    Source URL: wenke.gtisc.gatech.edu

    Language: English - Date: 2013-09-30 15:23:13
      143Internet Insecurities Are Not Diseases Paul N. Hilfinger∗ University of California at Berkeley 13 July 2000† As the Internet grows in size and importance, so too do malicious or mischievous attacks on it and on the c

      Internet Insecurities Are Not Diseases Paul N. Hilfinger∗ University of California at Berkeley 13 July 2000† As the Internet grows in size and importance, so too do malicious or mischievous attacks on it and on the c

      Add to Reading List

      Source URL: http.cs.berkeley.edu

      Language: English - Date: 2003-01-12 18:33:26
        144Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks George Theodorakopoulos and John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Uni

        Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks George Theodorakopoulos and John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Uni

        Add to Reading List

        Source URL: users.cs.cf.ac.uk

        Language: English - Date: 2012-09-20 10:47:14
          145Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School  Abstract—To counter the growing threat of malicious sub

          Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School Abstract—To counter the growing threat of malicious sub

          Add to Reading List

          Source URL: cisr.nps.edu

          Language: English - Date: 2012-10-30 13:43:14
            146A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users George Theodorakopoulos and John S. Baras Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland

            A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users George Theodorakopoulos and John S. Baras Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland

            Add to Reading List

            Source URL: users.cs.cf.ac.uk

            Language: English - Date: 2012-09-20 10:46:49
              147An On-line Learning Statistical Model to Detect Malicious Web Requests Harald Lampesberger1,2 , Philipp Winter1 , Markus Zeilinger1 , and Eckehard Hermann1 1

              An On-line Learning Statistical Model to Detect Malicious Web Requests Harald Lampesberger1,2 , Philipp Winter1 , Markus Zeilinger1 , and Eckehard Hermann1 1

              Add to Reading List

              Source URL: nymity.ch

              Language: English - Date: 2015-12-06 00:57:29
                148arXiv:1401.4917v1 [cs.CR] 20 JanSpoiled Onions: Exposing Malicious Tor Exit Relays  Philipp Winter

                arXiv:1401.4917v1 [cs.CR] 20 JanSpoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter

                Add to Reading List

                Source URL: nymity.ch

                Language: English - Date: 2015-09-21 15:27:36
                  149Many fake sites have been popping up recently with similar names to legitimate bank sites. These sites may look similar, but can be malicious. Always check the address before clicking any links to log into your account (

                  Many fake sites have been popping up recently with similar names to legitimate bank sites. These sites may look similar, but can be malicious. Always check the address before clicking any links to log into your account (

                  Add to Reading List

                  Source URL: www.countryclubbank.com

                  - Date: 2015-09-11 17:14:03
                    150EnGarde: Protecting the mobile phone from malicious NFC interactions J. Gummeson1 , B. Priyantha2 , D. Ganesan1 , D. Thrasher1 , P. Zhang1 1  {gummeson,

                    EnGarde: Protecting the mobile phone from malicious NFC interactions J. Gummeson1 , B. Priyantha2 , D. Ganesan1 , D. Thrasher1 , P. Zhang1 1 {gummeson,

                    Add to Reading List

                    Source URL: people.cs.umass.edu

                    Language: English - Date: 2013-04-20 17:28:53