141![Blackberry Proof-of-Concept: Malicious Applications Mayank Aggarwal, C|EH, SCJP Junos Pulse Global Threat Center Presented by Konstantin Yemelyanov, PhD Blackberry Proof-of-Concept: Malicious Applications Mayank Aggarwal, C|EH, SCJP Junos Pulse Global Threat Center Presented by Konstantin Yemelyanov, PhD](https://www.pdfsearch.io/img/3b406167dbc542c63f56b572050f509d.jpg) | Add to Reading ListSource URL: archive.hack.luLanguage: English - Date: 2010-10-30 01:26:03
|
---|
142![The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers Charles Lever Georgia Institute of Technology The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers Charles Lever Georgia Institute of Technology](https://www.pdfsearch.io/img/82228e4f1b78a1d39fc8991fba75cd08.jpg) | Add to Reading ListSource URL: wenke.gtisc.gatech.eduLanguage: English - Date: 2013-09-30 15:23:13
|
---|
143![Internet Insecurities Are Not Diseases Paul N. Hilfinger∗ University of California at Berkeley 13 July 2000† As the Internet grows in size and importance, so too do malicious or mischievous attacks on it and on the c Internet Insecurities Are Not Diseases Paul N. Hilfinger∗ University of California at Berkeley 13 July 2000† As the Internet grows in size and importance, so too do malicious or mischievous attacks on it and on the c](https://www.pdfsearch.io/img/bfe1619a6fc9cc3e20a1093958434382.jpg) | Add to Reading ListSource URL: http.cs.berkeley.eduLanguage: English - Date: 2003-01-12 18:33:26
|
---|
144![Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks George Theodorakopoulos and John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Uni Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks George Theodorakopoulos and John S. Baras Institute for Systems Research Department of Electrical and Computer Engineering Uni](https://www.pdfsearch.io/img/80f31fa5ac16abe1bab1d7d2054dcd38.jpg) | Add to Reading ListSource URL: users.cs.cf.ac.ukLanguage: English - Date: 2012-09-20 10:47:14
|
---|
145![Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School Abstract—To counter the growing threat of malicious sub Security Checkers: Detecting Processor Malicious Inclusions at Runtime Michael Bilzor, Ted Huffmire, Cynthia Irvine, and Tim Levin U.S. Naval Postgraduate School Abstract—To counter the growing threat of malicious sub](https://www.pdfsearch.io/img/b7bcb02d6ecf4a796050fb45853cdf80.jpg) | Add to Reading ListSource URL: cisr.nps.eduLanguage: English - Date: 2012-10-30 13:43:14
|
---|
146![A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users George Theodorakopoulos and John S. Baras Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users George Theodorakopoulos and John S. Baras Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland](https://www.pdfsearch.io/img/986351e4ff36b24149b49b267bff2b73.jpg) | Add to Reading ListSource URL: users.cs.cf.ac.ukLanguage: English - Date: 2012-09-20 10:46:49
|
---|
147![An On-line Learning Statistical Model to Detect Malicious Web Requests Harald Lampesberger1,2 , Philipp Winter1 , Markus Zeilinger1 , and Eckehard Hermann1 1 An On-line Learning Statistical Model to Detect Malicious Web Requests Harald Lampesberger1,2 , Philipp Winter1 , Markus Zeilinger1 , and Eckehard Hermann1 1](https://www.pdfsearch.io/img/c75ace28d039e12066949a45bb187e16.jpg) | Add to Reading ListSource URL: nymity.chLanguage: English - Date: 2015-12-06 00:57:29
|
---|
148![arXiv:1401.4917v1 [cs.CR] 20 JanSpoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter arXiv:1401.4917v1 [cs.CR] 20 JanSpoiled Onions: Exposing Malicious Tor Exit Relays Philipp Winter](https://www.pdfsearch.io/img/fd2a3f335ccfb1268b16e8c2b0d1bbf9.jpg) | Add to Reading ListSource URL: nymity.chLanguage: English - Date: 2015-09-21 15:27:36
|
---|
149![Many fake sites have been popping up recently with similar names to legitimate bank sites. These sites may look similar, but can be malicious. Always check the address before clicking any links to log into your account ( Many fake sites have been popping up recently with similar names to legitimate bank sites. These sites may look similar, but can be malicious. Always check the address before clicking any links to log into your account (](https://www.pdfsearch.io/img/c90b6e10042580973eb303ff30058146.jpg) | Add to Reading ListSource URL: www.countryclubbank.com- Date: 2015-09-11 17:14:03
|
---|
150![EnGarde: Protecting the mobile phone from malicious NFC interactions J. Gummeson1 , B. Priyantha2 , D. Ganesan1 , D. Thrasher1 , P. Zhang1 1 {gummeson, EnGarde: Protecting the mobile phone from malicious NFC interactions J. Gummeson1 , B. Priyantha2 , D. Ganesan1 , D. Thrasher1 , P. Zhang1 1 {gummeson,](https://www.pdfsearch.io/img/39e2c2f0518fac57642688573d32b82a.jpg) | Add to Reading ListSource URL: people.cs.umass.eduLanguage: English - Date: 2013-04-20 17:28:53
|
---|